Published on 03/07/16 11:56PM
Here is a recap of the RSA event from a vendor perspective while offering practical advice for future conferences.Read More
Bitdefender and 5nine Join Forces To Hit a `Sweet Spot’ of Security and Performance for Hyper-V Users
Published on 02/24/16 05:00PM
Bitdefender and 5nine have joined forces to hit a `sweet spot’ in the Hyper-V virtualization market in a product that brings the world’s highest quality of protection to companies’ virtual environments while maintaining optimum performance.Read More
Published on 12/03/15 03:00PM
Bitdefender and Egress Software Technologies have joined forces in a successful partnership that will bring the highest level of antivirus security to the market’s leading encryption services.
Published on 11/25/15 03:00PM
Published on 10/29/15 03:30PM
With malware losses costing upwards to $500 Billion dollars, rest assured that malware writers will want to set new records for 2015[i]. As the world becomes more interconnected, the speed to deliver future technologies has become an important factor to get ahead of the competition. Competitive pressures continue to force companies to deliver the next big thing, but they are creating security loop holes, vulnerabilities, and security lapses that facilitate malicious attacks.Read More
Published on 10/23/15 02:30PM
The cloud marketplace is in continuous evolution. As a cloud service provider, you’re facing new challenges every day: new cloud technologies are stealing your thunder, and new data breaches like the (in)famous Ashley Madison case are refreshing security concerns with regards to cloud services. And surely, when talking with potential customers, you’ve faced them more than once. You are expected to answer not only questions about the technology, scalability and cost of your solutions, but also about your security model.Read More
Published on 10/14/15 01:30PM
Recently I talked about the ever growing Mac market share –registering 16% global growth YoY – in an overall decreasing PC market –contracting global at 12% YoY. In the same post we saw how, malware growth was up 286% in the same time period. In this post, second in this Mac-focused series, I would like to highlight a lesser known evil which we do not even classify as malware, yet is having just as a dramatic impact on user experience and business productivity: Potentially Unwanted Applications (PUAs) a.k.a. Potentially Unwanted Programs (PUPs) / adware.
PUAs generally come from third-party download sites. The software you download from such sites can include both the software that you want and adware you may not necessarily want, but you inadvertently accept during the installation process, as it is commonly accepted as non-malware.
“PUAs generally include software that displays intrusive advertising, or tracks the user's Internet usage to sell information to advertisers, injects its own advertising into web pages that a user looks at…Unwanted programs often include no sign that they are installed, and no uninstall or opt-out instructions”
Published on 10/07/15 02:00PM
The fact that home and office network devices are insecure is nothing new. For years now, security researchers have pointed out security holes in printers and home and office routers. And we’ve already seen malware exploiting vulnerabilities in routers to spread to other connected devices, and even hackers exploiting these vulnerabilities to take over the devices and use them to launch DDoS attacks towards online services. A case in point: in one of the largest DDoS attacks to date, hackers were able to bring down Sony and Microsoft’s gaming platforms around Christmas last year, relying in great part on hacked internet routers. Taking control over millions of home routers protected by little more than factory-default usernames and passwords, they were able to create botnets of home and office routers, and use them to launch DDoS attacks on the online gaming services.Read More
Published on 09/30/15 12:20PM
On July 5, the Italian surveillance company, Hacking Team, got hacked. Reportedly, hackers stole and made public 400 GB of data, including a number of spying/surveillance tools and vulnerability exploits. By July 8, one of these vulnerabilities, a Flash Player zero-day, was already being used by other malware actors to deliver Cryptolocker ransomware. Four days later, it was reported that at least another Adobe Flash vulnerability was being exploited. Needless to say, Adobe was in for some serious patching.Read More