by Communications | Apr 20, 2021 | Trend Micro
The internet of things (IoT) has created a new domain for botnet developers to compete and thrive in. Already, there they battle one another for devices while their victims contend with persisting infections. But the involvement of a well-known file-sharing...
by Communications | Mar 18, 2021 | Trend Micro
Cybersecurity people have been generally outspoken that backdoors are bad. When governments or intelligence agencies suggest that a phone, cryptography tool, or product have a backdoor installed, both blue and red teams agree that it’s a very bad idea....
by Communications | Aug 20, 2020 | Industry, Lenovo
It’s often said that it takes only 20 days to form a new habit. And if we have learned anything in the past five months working from home, it’s that new habits form much faster than we could ever have imagined. If you had told me six months ago—weeks before the world...
by Communications | Jun 10, 2020 | Tenable
Learn how to take advantage of the newest features in Nessus 8.10 to get greater control over your Nessus experience. Manual or automated – that is the question. Nessus Professional 8.10 offers system administrators a bit of both. From new update options that allow...
by Communications | May 27, 2020 | Tenable
Identifying software vulnerabilities is essential in protecting your business against cybersecurity threats. From ransomware to data heists, a wide range of attack types use software vulnerabilities as an entry point into IT configurations. Dealing with security...