A new ransomware named Petya hit high-profile targets in multiple countries, including the United States, on Tuesday.
While Petya has not infiltrated as many machines as ransomware WannaCry did in May, it is more dangerous and has the power to create more damage. Here’s how to protect yourself and your small business from attacks like Petya. Read more.
In spite of a recent effort to improve the performance and detection rates in Windows Defender, Microsoft’s anti-malware tool is still not very good at its job. According to the latest tests, it’s downright lousy.
The latest round of tests performed by German institute AV-TEST, one of the most respected and regarded malware testing shops, show that Microsoft Security Essentials and Windows Malicious Software Removal Tool fared the poorest in removing an existing infection.
A series of security breaches that stuck prestigious law firms last year was more pervasive than reported and was carried out by people with ties to the Chinese government, according to evidence seen by Fortune.
Adobe Systems has fixed more than 30 vulnerabilities in its Flash Player and Digital Editions products, most of which could be exploited to remotely install malware on computers.
The bulk of the flaws, 26, were patched in Flash Player on all supported platforms: Windows, Mac and Linux.
Th15p@$$w0rd! is actually a worse password than thispasswordis,believeitornot. Find out why you shouldn’t use symbols or caps in passwords, and what you should use instead.
There is no mistaking it, cybersecurity and data breaches are now front and center of everyone’s mind. Just in the last month we have seen two governments—the Philippines and Turkey—get hacked, not to mention the massive amount of government-shaking data leaked as part of the Panama Papers.
We have also seen governments creating more legislation around cybersecurity strategies, a good indication that they are trying to keep up with the times. For example, Australia just launched its new strategy in the later part of April.
There was a time when cyberattacks in the legal industry could be thought of merely as a consequence of law firms representing or taking on the powerful, connected, or controversial; when the risk of cyberattacks seemed inextricably linked to the case at hand.