Malware

What is a cyber kill chain?

The American military was the first to formalise the concept of a 'kill chain', loosely defined as the six steps in a chain to go through to eliminate a target. These steps fall under the acronym F2T2EA: Find, Fix, Track, Target, Engage, Assess.

How to tell if your computer has been hacked

Although most of us have some form of anti-malware software installed, this cannot always offer peace of mind in regards to attacks on our networks, given that cyber attacks are constantly evolving.

Sophos launches advanced email protection solution

SophosLabs research discovered that 75 percent of malware in an organization is unique to that organization which indicates the majority of attacks are zero-day

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

Top six security and risk management trends: Gartner

Analysts will explore the trends security leaders face during the Gartner Security & Risk Management Summit, September 10-11, 2018, London, U.K.

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.

Partner Content
How to identify, prevent and recover from cryptojacking attacks

Cryptojacking is a sneaky but extremely effective way for hackers to get their desired results in exactly the surreptitious, stealthy way they desire.

Partner Content
Cryptojacking: FAQs for Businesses

More than 2,000 computers from Aditya Birla company were targeted by hackers for cryptojacking.

What is corporate espionage? Inside the murky world of private spying

Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality.

Data security is integral to the booming healthcare sector

The adoption of Health Information Exchanges (HIEs), EHRs and automation, are on the one hand paving way for better patient care, and on the other hand, exposing private data to thefts and breaches.

Privileged access is a critical pathway to all attacks: Jeffrey Kok, CyberArk

By securing privileged access and secrets like API keys, SSL keys and encryption keys, organizations can their make journey to the cloud with a reduced risk posture, says Jeffrey Kok – Vice President, Pre-sales, Asia Pacific & Japan, CyberArk, in an interaction with IDG Media.

Victims of malicious crypto miners increases by 44 percent: Study

Statistics for the last 24 months show that miners are increasingly focused on developing markets and are taking advantage of internet users in these regions to grow their revenues.