How Blockchain Can Improve Internet of Things Security

|
Two of the hottest technology trends today are the rise in Internet of Things (IoT) and blockchain adoption. A recent report by the Cloud Security Alliance (CSA) brings these two areas together—in a potentially good way ... Read More
Six Years and Counting: Inside the Complex Zacinlo Ad Fraud Operation

Six Years and Counting: Inside the Complex Zacinlo Ad Fraud Operation

For more than a decade, adware has helped software creators earn money while bringing free applications to the masses. Headliner games and applications have become widely available to computer and mobile users the world over, with no financial strings attached. While generating untold revenue for the companies that run these ... Read More

Emergence of the Internet of Things and Other Issues are Raising Concerns about the Security of Wi-Fi Networks

|
Private and public Wi-Fi networks have become critical parts of the technology infrastructure of many organizations, particularly with the rise of mobile device users in the workplace. Many people rely on these networks to access the Internet, leverage corporate applications and data, and collaborate with their colleagues—among other uses ... Read More

Ransomware Attacks Emerge as Key Cyber Security Threat, Verizon Report Says

Ransomware attacks have emerged as a key cyber security threat for global organizations, according to the recently released 2018 Data Breach Investigations Report from Verizon ... Read More
Hide and Seek IoT Botnet resurfaces with new tricks, persistence

Hide and Seek IoT Botnet resurfaces with new tricks, persistence

On April 30, Bitdefender researchers became aware of a new version of the Hide and Seek bot we documented earlier this year. The botnet, the world’s first to communicate via a custom-built peer to peer protocol, has now also become the first to gain persistence (the ability to survive a ... Read More

Are You Ready for GDPR Compliance? Many Organizations Are Not

The deadline for one of the most highly publicized and impactful data privacy regulations in the world is approaching, and many companies are still not prepared ... Read More

Your protection is our mission, and we’re serious about it

|
In 2001, a team of 30 cyber security experts in Romania had a dream: to provide excellent protection in the rapidly growing, often dangerous new world of the internet. Today, more than 1,300 security experts on three continents work passionately to offer security solutions for more than 500 million users ... Read More
RadRAT: An all-in-one toolkit for complex espionage ops

RadRAT: An all-in-one toolkit for complex espionage ops

Around February this year, we came across a piece of malware that had previously gone unnoticed. Buried in the malware zoo, the threat seems to have been operational since at least 2015, undocumented by the research community. Our interest was stirred by its remote access capabilities, which include unfettered control ... Read More

Thinking of Moving ERP to the Cloud? Don’t Forget About Security

Enterprise resource planning (ERP) continues to be a mainstay of corporate IT, providing the backbone for a variety of business processes including finance, human resources, procurement, and services ... Read More

Small Gains, Big Wins – When Facing Cyber Threats, a Swift Response Could Save Your Company

Speed is the critical factor in mitigating the damage of a cyber attack, and will remain so for the foreseeable future. This is according to 74 percent of the C–level information security executives who participated in our brand new Small Gains, Big Wins Study, which looks at the cyber security ... Read More
Loading...