Think you’ve got Tracker on your phone?
If you're reading this article, it's likely that you're hoping for quick tips on what to do if you suspect there's spyware or a tracker on your phone. If that is the case, you're likely to be disappointed; there are no quick lists of things to identify or remove to...
Bad IoT security can bolster the network
IoT security is becoming more urgent. In October, 2017 warnings cropped up of a brewing Internet of Things (IoT) botnet building for an unknown attack at some time in the future, writes Tallen Harmsen, head of IndigoCube Cyber Security. More than one million...
Boost security by detecting active compromises
A huge surge in large-scale ransomware attacks, such as the recent WannaCry, Petya and variations thereof, coupled with massive data breaches such as Verizon, Deloitte and closer to home, Hetzner, is highlighting in no uncertain terms how crucial security solutions...
Roses are red, violets are blue, safeguard your apps so customers love you
Martin Walshaw, senior systems engineer at F5 Networks, discusses why decision-makers should reconsider their security focus this Valentine's Day. Love is purportedly in the air again, but is it being channelled in the right direction? As customers engage with your...
Cyber security is smarter now
Office 365 missed nearly 1-million spam, phishing, and other e-mails in September 2017 that contained malware of 10-million e-mails verified. By Tallen Harmsen, head of IndigoCube Cyber Security Of that number, the darkreading.com story continues, about 34 000 were...
Sophos in Gartner 2018 Magic Quadrant
Gartner has positioned Sophos as a Leader in its 2018 Magic Quadrant for Endpoint Protection Platforms. Sophos has been positioned as a Leader in all 10 of these reports since they were first published in 2007. In the report, Gartner states that the definition of an...
Adding threat intelligence to the security mix
Today’s threat landscape is so complex and fast-paced, it is impossible to prevent every threat or attack. The criminal organisations behind cybercrime are well-funded, and have the technical skills to stay ahead of mitigation tools and techniques. They target...
Predictive protection from Sophos
Sophos has announced the availability of Intercept X with malware detection powered by advanced deep learning neural networks. Combined with new active-hacker mitigation, advanced application lockdown, and enhanced ransomware protection, this latest release of the...
Fujitsu helps homeless youth access support
Fujitsu is providing its PalmSecure palm vein recognition technology to the international development and human rights organization itwillbe.org, to help improve the lives and outlook of children living on the streets in India. The Fujitsu palm vein readers were...
How to avoid being scammed
From phishing to identity theft, the invasion of privacy, Internet/ATM/wire fraud, file sharing and piracy, counterfeiting and forgery, child pornography, and hacking -- cybercrime is a chilling and imminent threat across the globe. With botnets, ransomware, spam and...
How to avoid being scammed
From phishing to identity theft, the invasion of privacy, Internet/ATM/wire fraud, file sharing and piracy, counterfeiting and forgery, child pornography, and hacking -- cybercrime is a chilling and imminent threat across the globe. With botnets, ransomware, spam and...
ESET challenges in endpoint protection
ESET has been named as the only Challenger in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms. ESET was evaluated based on its ability to execute and completeness of vision. The company believes this placement reflects its consistently improved...