Tags » Computer Security

Cyberattack Reaches Asia-Pacific, Though Focus Remains on Europe

The regional offices of global firms are grappling with the ransomware attack, but the effects so far appear limited compared with last month’s WannaCry malware. 79 more words


ZigBee Protocol**

IoT goes nuclear: creating a ZigBee chain reaction Ronen et al., IEEE Security and Privacy 2017

You probably don’t need another reminder about the woeful state of security in IoT, but today’s paper choice may well give you further pause for thought about the implications. 236 more words


Cybersecurity firm Trend Micro announces $100M startup fund

Security firm Trend Micro is the latest corporate to jump into the startup investment world after it unveiled a $100 million corporate fund today. It is predominantly looking at opportunities in the internet-of-things (IoT) space, but the exact scope of how it will operate is not clear. 326 more words


Zero Day Exploits - What are they and How can you prevent them?

There are plenty of security threats that have the potential to have a negative impact on your business. One of the most frightening for many business owners and security professionals, however, is the zero-day exploit. 597 more words

Data Security

WSO Shell

Imagine that one day you discover that a burglar has broken into your home and attempted to make off with your big-screen TV. Fearing for your safety, you immediately contact local law enforcement, and they promptly apprehend the criminal. 230 more words


Spybot - Search and Destroy Portable 2.6 Has Been Released By PortableApps.com

Get the new release of Spybot – Search & Destroy, portable version, at PortableApps.com. Great addition to your tech toolbox…

Spybot – Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications.

34 more words