Computer data is generally organized in data structures such as arrays, records, graphs, classes, or other configurations for efficiency.

Nemucod is a Trojan that downloads malicious files to an infected computer. According to Symantec, Nemucod was first discovered in December of 2015.

Pokémon GO has taken the mobile world by storm. Here are our tips for avoiding criminals in real life and online while playing the game.

Whether carried out maliciously or simply the result of employee error, learn just how common data breaches are within the public and private sectors.

Since the beginning of 2015, ransomware infections have been on an upward climb. March, April, and May each broke the record set by the previous month.

Organizations should operate on the belief that bad guys are already in their system, and should devote efforts towards identifying how to find attackers.

The malevolent person or group behind a security breach has your username, possibly email address and password and probably additional personal information.

On April 29, 2016, we released complete rewrites to our CIS Microsoft Windows 7 Benchmark v2.1.0 and CIS Microsoft Windows Server 2008 R2 Benchmark v2.1.0.

April 28, 2016
Malvertising, or malicious advertising, is the use of online, malicious advertisements to spread malware and compromise systems.

Making Security Happen
February 29, 2016
Our mission is to lead communities to shepherd security best practices and continuously develop world-class security solutions supporting those practices.

In 2015 the MS-ISAC identified around 25 online posts, per month, that contained email addresses and passwords belonging to U.S. government employees.

Cyber threat intelligence is what cyber threat information becomes once it has been collected, evaluated in the context of its source and reliability.

1 23 24 25