Written by: Aamir Lakhani, Fortinet. In cybersecurity terminology, an exploit is a bit of code or a program that takes advantage of vulnerabilities or flaws in...
Malware has been playing an important role in the expansion of botnets, automating the process of bot infection and recruitment. These botnets are then used to...
ESET researchers have discovered a set of 10 previously undocumented malware families, implemented as malicious extensions for Internet Information Services (IIS) web server software. Targeting both government mailboxes and e-commerce credit card transactions, as well...
Malwarebytes has launched its inaugural channel programme for partners across EMEA. The programme has been designed to be simple and easy to join, and focuses on...
Quick Heal Technologies today announced the results of its Second Quarter Threat Report for 2016. The complete report, which can be downloaded from the Quick Heal...
The increasing risk of mobile breaches turning smartphones into surveillance devices is behind a growing niche market for devices designed specifically for enhancing privacy, according to...