Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 71 to 80
Step 2. Manage Authentication And Safeguard Access: Top 10 Actions To Secure Your Environment
17th Dec 2018 [one month ago] from Microsoft
This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. We will provide advice on activities such as setting up identity management through active directory, malware protection,...
The Most Popular Passwords Of 2018 Revealed: Are Yours On The List?
17th Dec 2018 [one month ago] from ESET Research
Besides the usual suspects among the worst of passwords, a handful of notable – but similarly poor – choices make their debuts The post The most popular passwords of 2018 revealed: Are yours on the list? appeared first on...
The Most Popular Passwords Of 2018 Revealed. Are You Using Them?
17th Dec 2018 [one month ago] from ESET Research
Beyond the usual suspects among the worst of passwords, a handful of notable – but similarly poor – choices make their debuts The post The most popular passwords of 2018 revealed. Are you using them? appeared first on...
Cybercriminals Use Malicious Memes That Communicate With Malware
14th Dec 2018 [one month ago] from TrendMicro
Steganography, or the method used to conceal a malicious payload inside an image to evade security solutions, has long been used by cybercriminals to spread malware and perform other malicious operations. We recently discovered malicious...
How To Protect Yourself As The Threat Of Scam Apps Grows
14th Dec 2018 [one month ago] from ESET Research
As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices? The post How to protect yourself as the threat of scam apps grows appeared first on WeLiveSecurity
Malaysian Government Targeted With Mash-up Espionage Toolkit
13th Dec 2018 [one month ago] from ESET Research
An interview with ESET researchers Tomáš Gardoň and Filip Kafka on their research of a malware toolkit used in espionage against the Malaysian government The post Malaysian government targeted with mash-up espionage toolkit appeared...
Spammed Bomb Threat Hoax Demands Bitcoin
13th Dec 2018 [one month ago] from Krebsonsecurity
A new email extortion scam is making the rounds, threatening that someone has planted bombs within the recipients building that will be detonated unless a hefty bitcoin ransom is paid by the end of the business day.
Microsoft AI Competition Explores The Next Evolution Of Predictive Technologies In Security
13th Dec 2018 [one month ago] from Microsoft
Predictive technologies are already effective at detecting and blocking malware at first sight. A new malware prediction competition on Kaggle will challenge the data science community to push these technologies even furtherto stop malware...
2019 Will See Cybercriminals Eye Opportunities In Cryptocurrency And IoT To Launch Their Attacks
13th Dec 2018 [one month ago] from Zscaler
Cybercriminals never take vacations. They’re always scanning the horizon to see which new technologies are being adopted by legitimate enterprises and are therefore ripe to be exploited, or how to utilize trusted protocols to steal credentials...
What Are Deep Neural Networks Learning About Malware?
13th Dec 2018 [one month ago] from FireEye Research
An increasing number of modern antivirus solutions rely on machinelearning (ML) techniques to protect users from malware. While ML-basedapproaches, like FireEye Endpoint Security’s MalwareGuardcapability, have done a great job at detecting...
« Newer 3 4 5 6 7 8 9 10 11 12 Older »