Articles & Analysis

Mitigating Enterprise based APTs

Mitigating Enterprise based APTs

Globally, dealing with Advanced Persistent Threats have become an integral part of every CISOs. Unlike conventional cyber threats, APTs are extremely complex to detect and mitigate. In this context, let’s take a look at some the rising...

Advanced Persistent Threat (APT)

Top Two Ways Most Companies Get Breached

Companies are always looking for the new technology that will protect them from cyber attacks. Yet, F-Secure experts say that most companies get breached through one of two ways. And neither have anything to do with zero day vulnerabilities, which,...


Robots Vulnerable to Cyberattacks

The software and firmware that bring robots to life are affected by potentially serious vulnerabilities that can allow hackers to remotely take control of the machines, according to an analysis. Robots are increasingly common in homes, businesses,...


Ransomware Doubled in Second Half of 2016

Check Point Software Technologies Ltd., today released its H2 2016 Global Threat Intelligence Trends, revealing that ransomware attacks doubled during the period.  Out of all recognized malware incidents globally, the percentage of ransomware...

© COPYRIGHT 2014-15 — INFOSECURITY LIVE. All Rights Reserved.
An initiative of BLITZ INDIA.

buy medicament amoxil online