Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Advanced Malware Detection – Signatures vs. Behavior Analysis

By John Cloonan, Director of Products, Lastline, Inc. Malware has threatened our computers, networks, and infrastructures since the eighties. It is constantly evolving, and deploying products that effectively detect it…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , | Comments Off on Advanced Malware Detection – Signatures vs. Behavior Analysis

Multi-Factor Authentication and Mobile Devices

Smart Security Makes Life Easier for Users…and Harder for Hackers By George Brostoff, CEO, SensibleVision Security is as much about deterrence as prevention. From the highest-clearance government servers to the…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , | Comments Off on Multi-Factor Authentication and Mobile Devices

Kaspersky report: Malware shared by USCYBERCOM first seen in December 2016

The malware samples shared by USCYBERCOM last week were first detected in December 2016 in attacks attributed to Iran-linked APT33. Last week the United States Cyber Command (USCYBERCOM) uploaded to…

Posted in Uncategorized | Tagged , , | Comments Off on Kaspersky report: Malware shared by USCYBERCOM first seen in December 2016

Hackers target Drupal servers chaining several flaws, including Drupalgeddon2 and DirtyCOW

Hackers targeted Drupal web servers chaining some known vulnerabilities, including Drupalgeddon2 and DirtyCOW issues. Security experts at Imperva reported an attack against Drupal Web servers running on Linux-based systems. Hackers exploited the Drupalgeddon2 flaw…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on Hackers target Drupal servers chaining several flaws, including Drupalgeddon2 and DirtyCOW

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X