All 101 Cybercrime Malwarebytes news PUP Security world Threat analysis

May 4, 2017 - OWASP recently published a draft list of the top 10 security vulnerabilities of 2017. While intended for developers seeking to code more secure applications, the top 10 list is based on actual survey data of threats seen in the wild and serves as a great starting point for organizations struggling with security priorities. Let's take a look and see how long they’ve been around prior to publication.

CONTINUE READINGNo Comments

April 11, 2017 - Learn about the additional risks you can face when using Mastodon, a social network with important differences to traditional ones.

CONTINUE READING5 Comments

February 27, 2017 - We take a look at what DNSSEC is and why we need it. Plus an overview of how far the implementation has progressed in the Netherlands based on a SIDN report.

CONTINUE READINGNo Comments

February 17, 2017 - Bayesian spam filtering is based on Bayes rule, a statistical theorem that gives you the probability of an event. In Bayesian filtering it is used to give you the probability that a certain email is spam. The name Named after the statistician Rev. Thomas Bayes who provided an equation that basically allows new information to...

CONTINUE READINGNo Comments

December 20, 2016 - Vetting vendors doesn't have to be painful - if you know your risk tolerance posture, and have a mature communication channel with your own security team.

CONTINUE READING1 Comment

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language