malware Tag

According to Gartner, the number of worldwide Internet-connected devices will grow to 11.4 billion by 2018. That’s an enormous number of new devices on our networks—and many, perhaps the majority of them, are extremely vulnerable to IoT malware attacks. Recently, self-propagating malware has infected IoT devices...

Home Depot agrees to pay $25 Million more as a result of their 2014 data breach. Earlier this month Home Depot reached an agreement to pay $25 million more to banks and credit unions as a result of the company’s massive 2014 data breach.  The $25...

When your company is under cyber attack — knowing your assailant’s next move can protect you from the next data breach. Wikipedia defines a cyber attack as " . . . any type of offensive maneuver employed by nation-states, individuals, groups, or organizations that targets computer information...

Businesses face a constantly increasing number of email-based attacks, and secure email gateways (SEG) are not always able to detect them. Augmenting your SEG with advanced malware protection is critical. Cybercriminals continue to use email as a primary attack vector. The sophistication of these attacks is...

Evidence continues to mount that most enterprises need to dramatically improve their cybersecurity. During the last few years, the majority of data breaches were first discovered by entities other than the affected organization—a clear indication that something is wrong. In 2015, research conducted by Intel1 found...

As the instigators of many cybersecurity attacks, it’s critical to discover and defeat Droppers.   There’s been a lot of excitement lately about malware droppers. So just what are they, and why do we care? A dropper is malicious software whose main purpose is to install other...