LATEST ARTICLES

Different Types of Malware and How to Defend Against Them

|

Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.

READ MORE

Mozilla Firefox is the First Pwn2own 2017 Victim to be Patched

|

Once again, Mozilla is quick to deal with a zero-day exploit first demonstrated at the Pwn2own hacking competition.

READ MORE

Google Patches 36 Vulnerabilities in Chrome 57

|

Researcher finds a high impact memory corruption flaw in Chrome's V8 JavaScript engine.

READ MORE

Considerations for Adding FIDO U2F to Your Security Protocol

|

If you're considering using the FIDO U2F protocol, here's what you need to know.

READ MORE

Authentic8 Advances Disposable Browser Security Model

|

Scott Petry, co-founder and CEO of Authentic8, talks about his past with Postini and how his new startup is the future of online security. [VIDEO]



READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

NSS Labs: Advanced Endpoint Protection Test Report

The ultimate goal of any attack on a computer system is to gain access to a target host and perform an unauthorized action, which results in the compromise of an asset or data. Intruders may use several techniques to circumvent these levels of protection, such as targeting vulnerable …

5 Common Types of Ransomware and How to Defend Yourself

It's easy to assume that all ransomware is similar and to think that one size fits all, in terms of prevention and preparation. However, that's an inaccurate assumption that can cost your organization downtime, data, and trust. If your organization doesn't understand the different types of …

How to Fight Ransomware with UnityŽ Active Archive

Of all the cybercriminal threats out there, being attacked by ransomware is among the most devastating. And here's the real issue: Anti-malware products are not infallible, and when they fail, conventional computer architectures readily allow data corruption by malware that masquerades as …

Could Your Business Survive a Cryptor?

As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. In the case of crypto-ransomware — or cryptors — the 'kidnapped' assets are the files and data that …
 
SEE ALL WHITEPAPERS
 
Google Chrome 46 Boosts Security

Google Chrome 46 Boosts Security

|

Google patches Chrome browser for 24 security issues

READ MORE
Bugzilla Hacked for Over a Year

Bugzilla Hacked for Over a Year

|

A single password reused from another site provided the attacker with privileged access.

READ MORE
Google Chrome 44 Updates for 43 Vulnerabilities

Google Chrome 44 Updates for 43 Vulnerabilities

|

Google pays out $39,674 in awards to researchers for disclosing web browser vulnerabilities.

READ MORE
Google Chrome 42 Gets Galactic Security Update

Google Chrome 42 Gets Galactic Security Update

|

No towel required for 45 security fixes in Google's Chrome 42 browser.

READ MORE