By Andrei Pisau on Feb 04, 2016 |
CIOs and CISOs unanimously agree that IT departments need beefed-up security with solutions that can not only cope with an ever-increasing number of threats, but also integrate with existing infrastructure to minimize both deployment and performance impact. Independent tester AV-TEST is known for thoroughly testing endpoint security for threat detection capabilities, performance impact and usability, establishing itself as one of the most respected and impartial independent testers. It is because of this that IT security managers carefully assess such findings and make important strategic decisions based on these results. With technology executives expecting to spend between 1% and 5% of their revenue on IT security, security and risk management are two challenges that can also be addressed by due diligence on endpoint protection security solutions. By Luana Pascu on Mar 24, 2017 |
In 2016, the number of ransomware attacks increased 300 percent from 2015, with over 4,000 attacks detected per day, according to US government statistics. Ransomware is among the worst types of infection, as it not only encrypts network data, but in the end may cost victims all their data – even if they pay the ransom. It should be a priority for all businesses and organizations in 2017. Ransomware is not limited to consumer networks; it’s one of the most sophisticated types of malware that targets all internet users, from private individuals to corporate networks to government agencies. Ransomware attacks on enterprises affect shareholders, employees and customers, and could lead to permanent damage caused by loss of confidential information, negative publicity and financial loss. By Bogdan Botezatu on Feb 24, 2017 |
Among the hottest trends in data center technology today is the growth of hyperconvergence, an IT infrastructure framework in which virtualized computing, networking and storage components are tightly integrated within a data center. In this type of software-centric IT environment, servers, storage systems and networking equipment such as switches work together through a single appliance. By its very nature, a hyperconverged framework can provide a more simplified IT environment. The potential benefits of this approach include easier management of all the integrated components of the data center, cost savings, improved data protection and greater scalability. The concept of hyperconvergence emerged from the idea of a converged IT infrastructure, which includes the implementation of a pre-configured software and hardware system for simplified management. Where the two differ is that with a converged data center the different components can be separated, while in a hyperconverged data center the components are tightly integrated and cannot be separated from each other. Recent predictions about the massive growth of ransomware attacks seem to be materializing, with another major breach. This one, on Dec. 27, led to the compromise of some 1.5 million user records, according to LeakedSource.
E-Sports Network ESEA, a platform for video game tournaments, did not detect the hack, but was informed by hackers who asked for $100,000 to not leak or sell the data on the black market. The company exchanged emails with the hackers, asked the FBI for help and started informing customers about the hack. Amazon customers beware: fraudsters have been targeting Amazon shoppers by creating seller accounts or taking control of genuine vendors to trick users into purchasing expensive items at unrealistically low prices.
An over £2,000, 55-inch LG OLED TV was on sale for half its price and labeled as a “used-like new” article by a vendor called ScElegance Electronics, according to a recent investigation by Comparitech. When the customer places the order for the TV, an error message appears asking the buyer “to complete the purchase outside of the Amazon system in a convincing phishing attempt.” The user never receives the item and Amazon will not offer a refund as the payment was not made through their system. |
Protect from RansomwareBuy Bitdefender now RECOMMENDED READINGs
All
|