home.aspx
 
EVENTS

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...

Absolute Software


Absolute provides persistent endpoint security and data risk management solutions for computers, tablets, and smartphones. Our customers rely on us to provide them with a unique and trusted layer of security so they can manage mobility while remaining firmly in control. By providing them with a persistent connection to all of their devices, our customers can secure endpoints, assess risk, and respond appropriately to security incidents.

RELATED NEWS


US officials have confirmed their intention to formally extradite Huawei CFO Meng Wanzhou from Canada to face criminal charges, according to reports. Meng, who is also the daughter of founder Ren Zhengfei, was arrested in Vancouver on December 1 last year at the request of Washington. A statement from the Department of Justice confirmed that the US plans to meet the 60-day deadline for filing a formal extradition demand, which runs to January 30. “We will continue to pursue the extradition...
INFOSECURITY MAGAZINE
READ MORE

The builder kit of a remote access Trojan (RAT) that was initially spotted in early 2017 contains a backdoored module, Zscaler reports. Dubbed Cobian and monitored since February this year, the RAT shows similarities to the njRAT/H-Worm family of threats, which has been around since 2013....
SECURITY WEEK
READ MORE

A series of cyber-attacks targeting the Middle Eastern region use an encrypted downloader to deliver a Metasploit backdoor, AlienVault reports. The attacks start with a malicious document containing parts of an article about the next Shanghai Cooperation Organization Summit, originally published at the end of May on a Middle Eastern news network. The Office document contains malicious macro code designed to execute a Visual Basic script (stored as a hexadecimal stream) and launch a new task in a...
SECURITYWEEK
READ MORE

Donald Trump's team used appearances on the Sunday morning news shows to try to shift the public focus on the intelligence community's report on Russian meddling in the U.S. presidential race. Instead of focusing on the crux of the report — that Russian President Vladimir Putin ordered a multifaceted campaign aimed at helping Trump take the White House — members of the president-elect's team emphasized Russia's failure to actually disrupt the country's democracy a...
THE HILL
READ MORE

IT execs may “feel” as though they’re prepared for a cyber-attack—but yet, they’re not investing anything in responding to one....
INFOSECURITY MAGAZINE
READ MORE

The share of Linux botnets is continuing to grow—accounting for 70% of attacks in Q3, compared to 51% in Q2. According to Kaspersky Lab’s Q3 2017 DDoS Intelligence Report, experts have continued to see an increase in the number of countries where resources have been targeted, with 98 countries subjected to DDoS attacks in the quarter—an increase from 86 countries in Q2....
INFOSECURITY MAGAZINE
READ MORE

EVENTS

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...