347 Results for:spyware
- Sort by:
Intrusion response plans: Tales from front-line IT support
16 Feb 2017The right intrusion response training can make all the difference in data breach prevention. Expert Joe Granneman provides a real-world example from which enterprises can learn. Read More
5 factors for using open source code in proprietary software
02 May 2019To make the best use of the vast and varied pool of open source software available, developers must be astute about what can actually best serve a project. Read More
The ELSA project enables hackers to track and store geolocation data
30 Jun 2017News roundup: The ELSA project -- one of the released CIA hacking tools -- can track device locations. Plus, Senators move to ban Kaspersky Lab products from the military, and more. Read More
Upgrade to Internet Explorer 11 to reduce risk
06 Jan 2016Failure to update to the latest version of Internet Explorer by 12 January 2016 could put users at risk, Microsoft warns Read More
Public-private co-operation in the Nordics tackles growing cyber crime threat
18 Sep 2015Nordic governments and businesses are putting cyber security at the centre of their planning as threats increase Read More
Amanda Rousseau talks about computer forensics investigations
14 Aug 2018Amanda Rousseau, aka Malware Unicorn, discusses her time in computer forensics investigations with the DoD, as well as the joys of reverse engineering malware encryption by hand. Read More
Pegasus malware expands from iOS to Android
05 Apr 2017One of the more malicious iOS threats -- Pegasus malware -- has made its way to Android devices and it has some dangerous new tricks in its arsenal. Read More
Certificate authority business undergoes major changes
03 Nov 2017News roundup: Comodo and Symantec sales signal important changes in the certificate authority business. Plus, an Oracle vulnerability gets a CVSS score of 10.0, and more. Read More
USB attacks: Big threats to ICS from small devices
08 Feb 2019USB devices can carry malware that can wreak havoc on industrial control systems. Expert Ernie Hayden explores the history of USB attacks and possible mitigations. Read More
Strider cyber attack group deploying malware for espionage
08 Aug 2016Symantec security researchers have uncovered a spying campaign by a previously unknown group using modular malware as stealthware Read More