endpoint security
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112826/biohazard-400x200.jpg)
1 in 10 targeted attack groups use malware designed to disrupt
Cyber criminals are rapidly adding cryptojacking to their arsenal and creating a highly profitable new revenue stream, as the ransomware market becomes overpriced and …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102449/puzzle-400x200.jpg)
Nearly half of security pros rarely change their security strategy, even after a cyber attack
Nearly half (46 percent) of IT security professionals rarely change their security strategy substantially – even after experiencing a cyber attack. This level of cyber …
![cryptocurrency](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101752/cryptocurrency-400x200.jpg)
Cryptojacking is the new malware
The success of cryptocurrencies such as Bitcoin, is driving the increasing popularity of cryptomining, the process by which these currencies are earned. At its core, mining …
![Laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104809/laptop-dark-400x200.jpg)
Email inboxes still the weakest link in security perimeters
Over one-third of all security incidents start with phishing emails or malicious attachments sent to company employees, according to F-Secure. Types of attacks The single most …
![Windows Defender](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101828/windows-defender-atp-400x200.png)
Microsoft to provide Windows Defender ATP for older OS versions
Microsoft will backport Windows Defender Advanced Threat Protection (ATP) to meet the security needs of organizations that have not yet entirely switched to Windows 10. …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104352/google-chrome-skull-400x200.jpg)
How to keep your browser and devices safe from cryptojackers
Cryptojacking makes surfing the web similar to walking through a minefield: you never know when you might land on a booby-trapped site. Stealthy cryptocurrency mining scripts …
![Absolute dashboard](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102307/absolute_dashboard-400x200.jpg)
Let no endpoint go dark
The compromise of a single enterprise endpoint can ultimately lead to a wider security incident, ransomware outbreak, data breach, costly remediation and rebuilding of lost …
![Network](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102932/network-bot-400x200.jpg)
The next step in network security evolution
In 1987, Bernd Fix developed a method to neutralize the Vienna virus, becoming the first known antivirus software developer. In 2017, as we pass the 30-year anniversary, a lot …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102542/biohazard-400x200.jpg)
Sharp rise in fileless attacks evading endpoint security
A new Ponemon Institute survey of 665 IT and security leaders finds that over-reliance on traditional endpoint security is leaving organizations exposed to significant risk. …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111208/stop-sign-400x200.jpg)
How to stop Emotet malware from infecting your computer
The Emotet banking Trojan has been around since 2014. It continues to evolve, and has even been spotted acting like a distribution method for other banking malware. Latest …
![stop](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102855/stop-400x200.jpg)
Microsoft offers mitigation advice for DDE attacks scenarios
Microsoft has published a security advisorty containing DDE attack mitigation instructions for both users and admins. What’s a DDE attack? For a while now, attackers …
![up](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102706/up-400x200.jpg)
Is trading resilience for business growth a smart strategy?
Not long ago, the probability of a threat materializing was enough to open the IT pocketbook. Today, the mentality has shifted from one of risk prevention to one of risk …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD