Security

Last Updated on 22 July 2015, Total: 81 Blog Posts

  1. Iot - more devices to secure against hackers

    IoT is likely to disrupt business models and ecosystems across a range of industries... Read More

  2. Security updates available for Adobe Flash Player

    Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux... Read More

  3. Microsoft senses an increasing trend of macro malware

    New threats emerging that include some form of social engineering to convince users to manually enable macros and allow potential malicious code to run... Read More

  4. Dell SecureWorks 2014 Report on Underground Hacker Markets

    The Underground Hacker Markets are booming with counterfeit documents, premiere credit cards, hacker tutorials and 100% satisfaction guarantees... Read More

  5. Email authentication latest threats

    Authentication solves several specific issues related to email, but other problems are completely out of scope. Attackers know this, and have designed some of their attacks accordingly. Perversely, they are actually using authentication to improve the quality of their campaigns... Read More

  6. Malware Compromises 100,000+ WordPress Websites

    Researchers at Sucuri say that the SoakSoak Malware has impacted 100’s of thousands of WordPress specific websites... Read More

  7. Preventing insider attacks

    A Trend Micro’s Security Intelligence blog post groups prevention and mitigation techniques against insider attacks into two categories: technical and non-technical... Read More

  8. Recursive DNS Resolvers Vulnerability

    Recursive DNS resolvers may become stuck following an infinite chain of referrals due to a malicious authoritative server... Read More

  9. Security Predictions 2015: New Challenges and Risk Mitigation Drive Changes to IT Security

    Netwrix shares top security trends that will drive information technology in 2015... Read More

  10. What is DNS Hijacking?

    InfoSec Institute security researcher Ali Qamar describes DNS parameters that you can set in order to prevent DNS Hijacking... Read More

Featured Links