How can you destroy malware that doesn’t exist on a file?
Hackers are sending out phishing emails to users trying to get them to access a file on the popular file-sharing service Dropbox. And if your users open it, your company could be in for a serious headache.
When hackers steal data, it’s a crap shoot. Maybe they’ll find valuable information they can sell to an interested party, but they may not get good info or have interested customers. So to get around that, a new trend is taking place – one that’s an easy payday for them, and a nightmare for IT and your […]
You know a cyberthreat is bad when even Congress is taking time to look into it. And with the rise of malicious advertising – or malvertising – they’ve had good reason to take note.
There are some basic rules for mobile security that have long been thought to keep you in the clear. But researchers have discovered these rules might not be able to protect Android devices from “pileup” malware.
Another day, another study showing Android dominates Apple in mobile malware. But the latest study also has another figure that will be of interest to IT – one that doesn’t get nearly enough coverage.
Even if your company isn’t in retail and has never processed a credit card transaction, there are some major lessons to be learned from the recent Target data breach.
It’s December, which means it’s the time to look back on the year’s best-of lists, top news stories … and yes, even malware attacks and security threats.
Most companies are using antivirus software, firewalls and other security tools to protect their networks. But attackers are constantly finding new ways to get around those controls.
Cyber criminals always seem to stay one step ahead of IT – as protections improve in some areas, the hackers shift their focus to others.