by Dutta | May 28, 2017 | Other Security Topics
When it comes to data protection and regulatory compliance, most of the organizations are not taking into consideration all risk factors that could hinder the security process. The lack of awareness and preparation can lead businesses into failing to protect their...
by Dutta | May 23, 2017 | Virtualization
What Is Ransomware? Ransomware, What is WannaCry – Ransomware is a malicious software that blocks access to user data or data on the user system until the person affected pays a ransom to the person or organization who has blocked the data. More advanced ransomware,...
by Dutta | May 18, 2017 | Vulnerability Management
If you do not need to perform a full scan, you may choose from the list of Scan Types to run against a Target. Scan Types are a logical grouping of tests that test for specific classes of vulnerabilities such as SQL injection or Cross-Site Scripting tests which you...
by Dutta | May 16, 2017 | Software Vulnerability Management
Ransomware attacks are not uncommon; they are happening every day now. But, as reported in every major news outlet on the planet, including this article in Dark Reading, a new strain of ransomware called WannaCry (aka WanaCrypt and WCry) has spread through at least 74...
by Dutta | May 14, 2017 | Internet Security
Trackers are circling around your social media activities the way bees zero in on sweets: Both are incessantly circling around sniffing out the sweetest little details about you. But at least with bees, there is a recognizable buzz in the air when they come near. But...