Defending Macs and iOS Devices Against Malware TAGS: Apple | iOS | malware “Apple devices don’t get malware.” Those words have echoed throughout technology organizations and, for years, they were generally true. Times have …Continue reading →
March 19, 2024
Defending Macs and iOS Devices Against Malware TAGS: Apple | iOS | malware “Apple devices don’t get malware.” Those words have echoed throughout technology organizations and, for years, they were generally true. Times have …Continue reading →
Rootkits Unearthed TAGS: malware | rootkits “You’ve been infected with a rootkit.” The chilling verdict is often delivered by cybersecurity experts on television drama series, but …Continue reading →
Malware Jumps the Air Gap TAGS: air gap | malware During the summer and fall of 2010, a quiet cyberwar erupted between Iran on one side and the United States …Continue reading →
Drive-By Downloads TAGS: malware | web security You’ve installed antivirus software on your computer and are careful to avoid sketchy websites. You should be safe from malware …Continue reading →
Ransomware: Your Data Held Hostage TAGS: encryption | malware | ransomware “Your personal files are encrypted!” glares the headline on a red pop-up window. The text that follows warns the user that …Continue reading →
Malware Exposed TAGS: antivirus | malware Malware is perhaps the most dangerous threat to the security of the average computer system. Research by Microsoft recently estimated …Continue reading →
Email Security: Defending the Enterprise TAGS: email security | malware | SIEM Entities seeking to secure their email environments should establish a comprehensive strategy designed to protect both the email infrastructure and …Continue reading →
Five Ways To Secure Your Systems Against Hackers TAGS: endpoint security | malware “Boss, I think that someone stole sensitive information from my system.” Those are words that no computer user ever wants …Continue reading →
The Discipline of Malware Management TAGS: antivirus | malware Ask many IT professionals about the status of their malware management efforts and you’ll often hear responses like “Oh, we …Continue reading →
Social engineering attack: How to remove rogue security software TAGS: malware | social engineering Security practitioners exhort users to install antivirus software and firewalls, and patch their systems. After hearing this for years, users …Continue reading →