Please turn on your JavaScript for this page to function normally.
Avast 2015 identifies vulnerable home routers

Avast Software launched Avast 2015, available in four consumer variations: Avast Free Antivirus, Avast Pro Antivirus, Avast Internet Security, and Avast Premier. All versions …

Think before you share that file

It’s hard to read through the news nowadays without stumbling upon some type of data breach or leak. Recently, Apple’s iCloud service has been in the limelight, …

Koler worm spreads via SMS, holds phones for ransom

A new variant of the Android malware Koler now spreads by text message and holds infected users’ phones hostage until a ransom is paid. AdaptiveMobile detected the …

60% of Android attacks use financial malware

Malicious programs targeting Android-based devices in order to steal money were used in 60 percent of attempted attacks registered by Kaspersky Lab security products, …

Cloud adoption trends in European organizations

In Europe, the number of cloud services in use by the average company increased 23 percent, rising from 588 in Q1 to 724 in Q3. However, not all of these services are ready …

What all major brands share in common with the Snappening

By now we have all heard about “The Snappening”—hyped as a high-profile data breach involving the photo-sharing application Snapchat. Virtually every news outlet …

Small healthcare facilities unprepared for a data breach

While healthcare breaches are on the rise, most small facilities feel that their systems adequately limit the risk of a data breach despite one in three facilities spending …

The Software Assurance Marketplace: A response to a challenging problem

With the steady proliferation of wearable devices and the emergence of the Internet of Things, everyone and everything will eventually be connected by some piece of software. …

Infographic: A brief history of malware

From simple disk-to-disk attacks in the 80s to email viruses in the modern day, malware is here to stay. This ESET infographic offers you insight about the origins and …

Week in review: POODLE bug, Microsoft patches a slew of 0-days exploited in the wild

Here’s an overview of some of last week’s most interesting news and articles: Identifying deceptive behavior in user-generated content In this interview, JT Buser, …

Targeted attack protection via network topology alteration

When it comes to targeted attacks, attackers are not omniscient. They need to gather information in the early stages to know the target they may gather information from …

The impact of disconnected security strategies

39% of organizations’ IT departments are spending too much time managing their security network and manually tackling threats, according to McAfee. Almost a third of IT …

Don't miss

Cybersecurity news