Loading...

If you take a closer look at phishing URLs for a while, you are able to identify them at a glance. There are typical patterns in phishing URLs which appear repeatedly. Those cases, in which certain patterns can be observed are generally well-suited to see use in machine learning. Here, you can learn more about how well machine learning works in this use case.

      
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

IT security and Android may not be mutually exclusive in 2018. Google has already laid the groundwork and wants to deliver important updates faster to users so as to waste no time closing security holes. The spectre of a mobile catastrophe is growing. Worldwide around 74 percent use a smartphone with an Android operating system (source: Statcounter). G DATA security experts also see the current malware numbers as pointing to an increased threat. In the first quarter alone, analysts discovered 846,916 new Android malware samples. Around 12 percent more than in the first quarter of the previous year.

      
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

It just so happens that the Star Wars saga (at least Episode IV-VI) is a textbook example of how not to handle what is basically a data breach. The Empire is, to put it mildly, woefully unaware of how data security works, resulting in less than ideal reactions in responding to the breach.

      
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

How beautiful life could be without passwords. They prevent others from accessing our data and computers. By sticking to just a few rules you can create passwords, that everyone can use.

      
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Security services from USA and UK warn about current attacks of the Russian government on routers, firewalls and intrusion detection systems of companies and public authorities. Successful attacks on the "heart of the network" may have versatile effects and endanger the whole IT ecosystem of affected nations. Those who believe this representation, may think that Russia is starting a cyber war. But, what are the accusations about?

      
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

For quite some time, criminal actors have been using mobile devices for mining, without the knowledge or consent of the user.

      
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The last few weeks have seen quite the outrage about the abuse of personal data harvested from Facebook by Cambridge Analytica (CA). There were also some serious errors in communication. A comment by Tim Berghoff

      
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The number of new malware types continued rising. The high numbers of the first half year were not achieved. CoinMiners have made it into the Top 10 of prevented attacks during the second half of 2017.

      
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Making lots of money quick is the objective of most ransomware. A current analysis from one of G DATA’s researchers also shows another potential motif for distributing ransomware.

      
Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

There are many aspects of Meltdown and Spectre that have an unpleasant aftertaste. One of these is the sale of a multi-million dollar Intel stock package shortly before the vulnerabilities in Intel's processors became publicly known.

      
Read Full Article
Visit website

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview