Apple’s latest iOS update fixes 3 security holes that can be used for jailbreaking and are apparently already being exploited in the wild. Source: Sophos
Apple’s latest iOS update fixes 3 security holes that can be used for jailbreaking and are apparently already being exploited in the wild. Source: Sophos
We’re in need of cybersecurity professionals. While the risks associated with digitalization increase (data in the cloud, corporate applications, the Internet of Things, etc.), the number of trained cybersecurity professionals remains low, creating the worst possible vulnerability for businesses: a lack of qualified IT professionals. In a recent study, it was estimated that around one […]
Prior to going on a trip, don’t just listen to the “usual” advice, like shutting the blinds or leaving your neighbor to house-sit your home. These precautions are just not enough. In the hyper connected world we live in, it is absolutely necessary to take other safety measures. Today, technology is all around us, and […]
While ransomware is a global threat, every now and then we see a variant that targets one specific region. For example, the Coinvault malware had many infections in the Netherlands, because the authors posted malicious software on Usenet and Dutch people are particular fond of downloading things over Usenet. Another example is the recent Shade […]
Download PDF Introduction The telecommunications industry keeps the world connected. Telecoms providers build, operate and manage the complex network infrastructures used for voice and data transmission – and they communicate and store vast amounts of sensitive data. This makes them a top target for cyber-attack. According to PwC’s Global State of Information Security, 2016, IT […]
Crooks are always creating new ways to improve the malware they use to target bank accounts, and now Brazilian bad guys have made an important addition to their arsenal: the use of PowerShell. Brazil is the most infected country worldwide when it comes to banking Trojans, according to our Q1 2016 report, and the quality […]
Download the full report (PDF) Spam: quarterly highlights The year of ransomware in spam Although the second quarter of 2016 has only just finished, it’s safe to say that this is already the year of ransomware Trojans. By the end of Q2 there was still a large number of emails with malicious attachments, most of […]