Cyber experts ponder whether next generation firewalls (NGFW) would be able to block cyber attacks involving artificial intelligence (AI) and machine learning. The methods and tools for cyber security have evolved over the years, and so have the threats, technologies,…
No. While both are responsible for network security, the approach they adopt is different. Antivirus defends against security threats through surveillance. That is, by constantly looking out for malicious software (and not just viruses). Whereas firewall defends against security threats…
Reports suggest that Mac is no longer a safe haven as it was believed to be; Mac malware reportedly is now the highest it has ever been and there has been a 230% rise in Mac malware attacks in the…
Another day, another malware. The latest victim’s name is NetSarang – a Korean software development company. It seems that the malware which has been named ShadowPad was successful in installing ‘what is known as backdoors’ in several of the products…
Once security breach is exposed, security experts in the industry need to know how the aggressors got into what should be a protected system, and what they’re really doing that is causing such issues for users. It’s a never ending…
In the present day world of zero-day attacks, an anti-virus solution alone is not enough to protect your enterprise systems. Not only have the number of cy ber threats increased but so has the complexity and modes of attacks. It…
GhostCtrl Android malware is a backdoor that can control the functionalities of an infected Android device. It is a Remote Access Trojan (RAT) that can also steal and exfiltrate information. It can reset the pin of an Android device, lock…
Installing Android security apps for your android devices might seem like an overkill. But they important. Mainly because android is by far the most popular mobile operating system in use today. So it’s no surprise that this Google’s OS is…
Having workloads allocated over multiple cloud platforms and on-premises is the truth by which the enterprise IT industry survives. According to the research and analysis by Enterprise Strategy Group, 75% of current open cloud platform clients implement the use of…
Android users have had their share of ransomware attacks this year. And yet things don’t seem to be getting any better for them. A new variant of the Koler ransomware – which first struck in 2014, branching out of the…