blog
-
Is spear phishing the new ransomware?
- October 16, 2017
- Posted by: admin
- Category: Computer Network Security
No CommentsIs spear phishing the new ransomware? BY CHRISTINE BARRY 0 COMMENTS In a 2016 survey on ransomware, 43% of North American consumers said they did not know what ransomware is. That’s despite the fact that ransomware activity had increased 300%during the same time period. Toward the end of 2016, ransomware attacks against businesses were taking place every 40 seconds.
-
AI for Spear Phishing Detection
- October 16, 2017
- Posted by: admin
- Category: Computer Network Security
Barracuda Sentinel uses AI to learn an organization’s communication history to predict and prevent future attacks. Barracuda Sentinel is powered by an AI engine that detects and blocks spear phishing attacks in real time. The AI engine automatically learns the unique communication patterns of each individual organization. It uses this knowledge to find anomalous signals
-
Important Update on WPA and WPA2 Vulnerabilities
- October 16, 2017
- Posted by: admin
- Category: Computer Network Security
Important Update on WPA and WPA2 Vulnerabilities On October 16, 2017, a statement from the International Consortium for Advancement of Cybersecurity on the Internet (ICASI) was released alerting the industry to a series of vulnerabilities for WPA and WPA2. These vulnerabilities are at the protocol-level and affect a large number of wireless infrastructure devices and
-
Ransomware in disguise: Experts say Petya out to destroy not ransom
- June 29, 2017
- Posted by: admin
- Category: Uncategorized
Security experts have said the Petya malware is out to irrecoverably wipe information, not hold to it to ransom. By Chris Duckett | June 29, 2017 — 03:51 GMT (20:51 PDT) | Topic: Security Petya ransom noteImage: Symantec Victims of this week’s Petya outbreak are being given one more reason to not pay up — the malware is not able to restore
-
Global cyberattack: What you need to know
- June 28, 2017
- Posted by: admin
- Category: Uncategorized
Global cyberattack: What you need to know by Selena Larson and Jethro Mullen @CNNMoney http://money.cnn.com/2017/06/28/technology/ransomware-attack-petya-what-you-need-to-know/index.html A massive ransomware attack has hit businesses around the world, causing major companies to shut down their computer systems. Researchers are still investigating the software behind the attack, warning that it’s more sophisticated than the WannaCry worm that struck hundreds of thousands of computers across
-
Pride goeth before the IT security fall
- May 28, 2017
- Posted by: admin
- Category: Uncategorized
Most organizations are in a state of denial when it comes to IT security. In fact, most of them think they’re doing a good job on IT security even after they’ve been a breached. A new survey of 400 IT leaders in the U.S. and United Kingdom conducted by Sapio Research on behalf of SolarWinds
-
Majority of companies already falling behind on GDPR compliance
- May 28, 2017
- Posted by: admin
- Category: Uncategorized
by Mike Vizard on May 25, 2017 There are a little less than 260 working days between now and when the European Union is expected to implement a General Data Protection Rule (GDPR) that among other things fines companies up to 20 million euros or 4 percent of their revenues for willful non-compliance. The rule
-
Gmail vs Inbox: Which Google email client is right for you?
- May 24, 2017
- Posted by: admin
- Category: Uncategorized
PC WORLD By Michael Simon Staff Writer, Greenbot | MAY 24, 2017 4:00 AM PT Credit: Greenbot Google loves to compete against itself, especially when it comes to messaging. When you want to send a text, you can hit up Allo, Android Messages, Hangouts, or Google Voice to do it, with each offering something none
-
Is Cybersecurity A Second Coming For AI?
- May 24, 2017
- Posted by: admin
- Category: Uncategorized
Juliette Rizkallah Artificial intelligence (AI) is all over the technology headlines lately. It seems to be the latest buzzword to take hold, yet the question remains: Will this be a quick fad, or are we actually seeing the second coming of AI? Most recently, there has been a heavy surge of artificial intelligence thinking applied
-
iPhone 8 renders from ‘highly detailed CAD files’ show embedded Home button, wireless charging [Gallery]
- May 16, 2017
- Posted by: admin
- Category: Uncategorized
9 To 5 Mac New iPhone renders created from a ‘highly detailed CAD file’ show an iPhone 8 design with embedded Home button, glass back and what appears to be an area carved out for a wireless charging coil. The report itself is rather confused, describing it as the iPhone 8 while suggesting the two sizes
- 1
- 2