Octopus Trojan disguises itself as Telegram messenger
Thycotic's 2018 Black Hat Survey reveals hackers' easiest points of entry
Social engineering is a dominant method used by hackers for seizing privileged accounts.
Shared responsibility: What it means for your cloud data and apps
Users often mistakenly believe that the security component is carried by their cloud provider, warns Westcon.
Fastly's Platform TLS enables secure browsing at scale
The solution helps brands get to HTTPS quickly.
Outsmarting e-mail hackers using AI, machine learning
Trend Micro's machine learning algorithms examine large volumes of data and predict if unknown file types are malicious or not.