The curse of Chimera ransomware

The curse of Chimera ransomware

There are numerous strains of malware out there, but one particularly unpleasant one is ransomware. While this malicious software has been around for some time, recently a newer, nastier upgrade was discovered. Posing a threat to businesses of all sizes, the program, called Chimera, has upped the ante when it comes to scaring its victims out of their hard-earned cash.

IT security predictions for 2016

IT security predictions for 2016

Online security has probably never been such a hotly debated subject as it was in 2015. From recent numerous high-profile attacks on Sony and others, to this year’s leaking of data stolen from the extramarital-affair-facilitating website Ashley Madison website, have pushed cyber security firmly into the spotlight.

How security companies adapt to IoT

How security companies adapt to IoT

The Internet of Things (IoT) has become quite a phenomenon, as more and more networked devices are connected to the Internet and generate valuable data for users. Security players, meanwhile, have detected this trend and are adapting themselves to IoT. In this article, some of our Security 50 companies share with us how they do it.

Twitter warns about cyber attacks

Twitter warns about cyber attacks

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook and Google have also been contacting any of their users who they think may have been targeted – it suggests that attacks of this type are becoming more widespread.

How Google overcomes secure browsing issues

How Google overcomes secure browsing issues

It’s safe to say that malware attacks, phishing scams, and social media engineering practices are going nowhere fast. That means that, whether you are a home user or the owner or manager of a small or medium-sized business, if you choose to ignore safer online security practices you are putting your identity and the security of your company at serious risk.

Security rules to keep your SMB safe

Security rules to keep your SMB safe

How secure is your business’s network? If your organization lost access to all data for 48 hours due to a cyber attack, could you still operate? Today, small and medium-sized businesses are increasingly targeted by hackers. If your security isn’t up to par, you could suffer a drop in profits and a damaged reputation, and could even potentially go out of business.

Takeaways from the Ashley Madison hack

Takeaways from the Ashley Madison hack

Regardless of what you think about the Ashley Madison hack, it is big news when it comes to data security. While your company may not be as big or deal with such a sensitive topic like Ashley Madison, you can still be at risk. This scandal can serve as a springboard to improving security throughout your company.

Selfie security is coming

Selfie security is coming

Log on to Facebook, Instagram or Twitter, or even simply take a walk in a city park, and one thing is clear: the selfie revolution is upon us. And now it looks as though this contemporary pastime is becoming more than just a social media trend. Major industry players are now using facial recognition technology to replace passwords as the new method of online identification.