Find

March 17, 2020

Beware scams exploiting coronavirus fears

Emergencies offer golden opportunities for con artists to launch fraudulent campaigns that feed off, and cash in on, the climate of concern. Against the backdrop of a disease that has so far caused more than 4,000 deaths and continues to spread, scammers have wasted no time in playing on people’s fears or evoking feelings of compassion.
by | 4 min read
March 12, 2020

Key findings of A10 Networks’ Q4 2019 DDoS weapons report

To help organizations take a proactive approach to DDoS defense, A10 Networks recently published a report on the current DDoS landscape, including the weapons being used, the locations where attacks are being launched, the services being exploited, and the methods hackers are using to maximize the damage they inflict.
by | 3 min read
March 12, 2020

ServiceNow introduces Now Intelligence

ServiceNow is a strategic digital transformation partner to the world’s largest enterprises, including approximately 80% of the Fortune 500. These enterprises use the Now Platform as their “platform of platforms” to streamline work by integrating siloed, legacy systems and digitizing complex workflows and processes across their organizations.
by | 3 min read
March 4, 2020

Global threat trends demonstrate intentions of cybercriminals

The research from Q4 2019 not only shows that cybercriminals continue to attempt to exploit any possible opportunity throughout the digital infrastructure, but that they are maximizing global economic and political realities to further enable their goals.
by | 4 min read
March 3, 2020

Communications of a billion+ devices were at risk, ESET

Kr00k is a vulnerability that causes the network communication of an affected device to be encrypted with an all-zero encryption key. In a successful attack, this allows an adversary to decrypt wireless network packets.
by | 2 min read
February 26, 2020

McAfee to Acquire Light Point Security LLC

The increasing use of the Internet, and the accelerating adoption of the cloud by companies, has made the browser one of the most vulnerable parts of an enterprise’s IT attack surface.
by | 2 min read
February 20, 2020

3 ways to avoid getting phone hacked

Mobile phones are becoming a fruitful and surprisingly easy target for hackers. It used to be that businesses issued their executives work phones that used only business applications. But today, our phones are just as likely to hold intellectual property memos as they are to be used for listening to music.
by | 4 min read
January 16, 2020

Vectra commentary for Windows 7 EOL

If a users’ current hardware does not support Windows 10 or a newer OS, it is likely old hardware that doesn’t support any of the latest versions of apps either. This means not only the OS is out of date, but everything is most likely out of date, which is a much bigger problem.
by | 2 min read
January 1, 2020

EdTech: The Perils and Promises

By Samreen Shaik There’s no denying that shortly technology will […]
by | 3 min read