Startups and information security
Credit to Author: Leonid Grustniy| Date: Tue, 16 Apr 2019 12:15:33 +0000
What makes startups dependent on data protection for success?
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Leonid Grustniy| Date: Tue, 16 Apr 2019 12:15:33 +0000
What makes startups dependent on data protection for success?
Read MoreCredit to Author: Pavel Shoshin| Date: Mon, 15 Apr 2019 10:00:10 +0000
Our proactive security technologies uncovered an attempt to exploit another zero-day vulnerability in win32k.sys.
Read MoreCredit to Author: Kaspersky Team| Date: Thu, 11 Apr 2019 07:19:51 +0000
The Microsoft Office threat landscape, and the technologies that help us catch related zero-day exploits, were the focus of this talk at the SAS 2019 conference.
Read MoreCredit to Author: Kacy Zurkus| Date: Wed, 10 Apr 2019 15:00:00 +0000
![]() | |
| Because medical records are such a lucrative data set, attackers often target the healthcare industry, seeking out and eventually finding the weakest link in the supply chain. That’s why it’s important for stakeholders to consider the broader implications of cybersecurity weaknesses in medical management apps. But who should be held responsible? Categories: Tags: Data privacyhealth appshealthcareHIPPAmedical appsmedical management appsvulnerabilities |
The post Who is managing the security of medical management apps? appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Pavel Shoshin| Date: Wed, 10 Apr 2019 03:10:08 +0000
A new APT attack targets the diplomatic mission of an Asian country.
Read MoreCredit to Author: Joyce Huang| Date: Tue, 09 Apr 2019 12:00:20 +0000

Fifteen years ago, Gmail was launched by Google. The web-based service now has 1.5 billion users a month. In addition to being the extremely popular personal email service, Gmail is also a key component of G Suite for organizations. One of the many reasons of Gmail’s popularity is its security. Google makes use of multiple…
The post Hit the Easy Button for Your Organization’s Gmail Security appeared first on .
Read MoreCredit to Author: Nikolay Pankov| Date: Mon, 08 Apr 2019 17:29:23 +0000
A story from RSAC 2019 on how domain fronting is used to disguise communications between an infected machine and a command server.
Read MoreCredit to Author: Trend Micro| Date: Mon, 08 Apr 2019 13:00:40 +0000

At Trend Micro we’ve spent the past three decades successfully solving problems for our customers. It’s helped us to become a leading provider of services to secure the connected world. But we’re not done there. We also want to find and learn from the technology innovators and problem-solvers of tomorrow. That’s why our venture arm,…
The post Dallas Start-Ups: Pitch Us Your Ideas for a Smarter Connected World appeared first on .
Read More