Hackers can use fax machines to infect a network
You may want to think twice before providing an enterprise fax number to a stranger Many companies still provide their fax number in the contact information section on their websites.Read More →
Malware News | Infosec Blog | Information Security Tutorials
You may want to think twice before providing an enterprise fax number to a stranger Many companies still provide their fax number in the contact information section on their websites.Read More →
Nearly 100 complaints have been presented during the first half of 2018 Since the announcement of the implementation of the free WiFi network in the public transportation system of MexicoRead More →
Researchers developed this stealth-attacking software Enterprise network security researchers have worked with artificial intelligence to automatically detect and fight malware attacks, as well as to stop any kind of cyberattack before itRead More →
Factories crippled after WannaCry variant infected Windows 7 devices without protection Enterprise network security specialists from the International Institute of Cyber Security reported that Taiwan Semiconductor Manufacturing Co. (TSMC), theRead More →
The popular PC cleaner CCleaner contained a backdoor, which affected millions of users Experts in enterprise network security reported changes in CCleaner version 5.45, with new functions for monitoring and data collection.Read More →
Workers had to improvise solutions Government employees in a small Alaska county have returned to use typewriters to do their job, after a virus attack violated their enterprise network security. ARead More →
Networks in 8 countries in North and South America remain offline A “local network collapse”, allegedly caused by a ransomware infection, has led China Ocean Shipping Company (COSCO) to shut down allRead More →
This is a reflection exercise on the possible evolution of one of the most common information threats nowadays. Are ransomware threats the big deal that media claim? Ransomware is a malwareRead More →
Another sign that the user-controlled software repository should not be fully trusted One of the most popular Linux distros, Arch Linux, has extracted up to three user-controlled repository packages afterRead More →
Nine of the consortium establishments have been compromised The malware found at the B&B Hospitality Group (B&BHG) sale points in the New York City area may have been used to accessRead More →