Adware may seem annoying at best when all it does is create pop-up and pop-under ads on your screen. But some adware have hidden capabilities that deliver more harmful malware behind the scenes.
Targeted attacks are designed to circumvent existing policies and solutions within the target network, making detection a challenge. To do this, IT administrators need to know what to look for, and where to check for signs of compromise.
Scrutinize that Google Drive or Dropbox link before clicking. Spam could be used to distribute backdoors; in this case, the message includes a link that points to a Google Drive URL.
Arbitrary code execution - this is the end-result if your Internet Explorer and Windows Media Center are not updated with the August security patches from Microsoft.
Security issues such as the Heartbleed bug and a number of huge data breaches were the main attractions of the second quarter of 2014. Targeted industries and security companies responded in varying fashion, all in the name of protecting end-users.
Cybercrime using targeted attack methods, botnets, and web defacement - these are some of the threats that have evolved and are thriving in Africa. What used to be the originators of the 419 Nigerian scam have embraced and allowed new threats.
Trend Micro research found that the attackers who compromised Gizmodo Brazil used vulnerable WordPress plugins in the attack. WordPress users are advised to enforce strong passwords and study theme codes carefully before deploying them.
Thinking and recalling strong passwords can be a challenge, especially for multiple accounts. If you don't want to trust your security to a password manager, here are a number of ways you can create strong passwords that you can remember.