Though dubbed the most successful malware in history Cryptowall can be stopped
The AlienSpy remote access Trojan has evolved into a cross-platform backdoor that affects Windows, Linux, Mac OS X and Android operating systems.
Kaspersky has confirmed the return of Carbanak as Carbanak 2.0 and uncovered two more groups working in the same style: Metel and GCMAN.
Due to the increasing demand of technology across the UK, IT jobs have survived the economic crisis better than any other profession.
Industry predictions for cyber-security are unlikely to achieve a consensus, but they do provide plenty of insights and recurring themes that serve as indicators of future trends, as the following edited forecasts reported by Tony Morbin demonstrate
There's no denying that cloud adoption is growing at a tremendous pace, along with a subsequent expansion of the threat landscape. Keeping mountains of data from numerous organisations on a third-party's servers might be a scary prospect for the security minded. But, Max Metzger asks, should we be worried?
Most companies are not ready or able to comply with the proposed new Data Protection Regulations, reports Roi Perez, while ignoring them is not an option given the prospect of heavy fines of up to €20 million
Dr Adrian Davis shares his top EMEA technology and security trends to watch this year including changing consumer expectations of data use and privacy as its value becomes apparent.
Both Dyre and Dridex Trojans now use a combination of local redirection and RAT to effectively escape detection by current anti-fraud and security tools, but Uri Rivner says real-time behaviour analysis can still spot the bad guys.
In instalment one of his four-part viewpoint series, Tony Collings outlines the first of his essential building blocks for the successful implementation of an IT project: have you got the business requirement right?