Zero-day vulnerabilities in Adobe Type Manager Library affects multiple Windows OSs
Microsoft has posted a security advisory about vulnerabilities in Adobe Type Manager Library, which are already being exploited by cybercriminals.
635 articles
Microsoft has posted a security advisory about vulnerabilities in Adobe Type Manager Library, which are already being exploited by cybercriminals.
Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions.
At RSA Conference 2020, Ben Smith addressed the need to consider generational differences in the workplace when creating a security strategy.
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
With deepfakes becoming more and more common — and more and more convincing — how can you protect your business?
Microsoft has released a patch for newly discovered critical vulnerability CVE-2020-0796 in the network protocol SMB 3.1.1.
Our security solution for Internet gateways is updated and more capable than ever.
At RSA Conference 2020, the former director of Cyber Intelligence and Investigations for the NYPD talked about how the police have raised cybersecurity awareness.
Quantum computers are set to change our approaches to data encryption. When that will happen is not yet clear, but we do know when companies need to start preparing — right now.
At the RSA Conference 2020 in San Francisco, a panel of experts discuss the issues with securing elections.
Researcher Fabian Ising, speaking at the Chaos Communication Congress, showed the limits of PDF encryption’s strength.
What exactly was certified and how the certification was performed
Researchers presented a study on the reliability of modern vehicle immobilization systems at the Chaos Communication Congress.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
End of support for Windows 7 is cause to analyze your information infrastructure carefully and identify weak spots.
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
Four steps to reduce your company’s IT carbon footprint — and save money.
Researchers try to modify the contents of a signed PDF file without invalidating the signature.