Filter Blogs expand_more
Blog add
Authors add
19 Results for 'malware'
Blog

By Entrust Datacard

February 27, 2013

In case you missed it, Entrust’s Jason Soroko (@jasonsoroko), who’s head of malware research, is doing real-time, split-screen key-logging demos via Metasploit, an anti-forensic and evasion detection tool. It’s live. It’s cool. And it’s going on each day at Entrust Booth 1139.
Blog

By Entrust Datacard

October 01, 2013

The network of your enterprise is outfitted with antivirus and firewall software to help safeguard against certain types of malware. This software stops most common strands of malware from entering your system and wreaking havoc on your network and devices. But is it enough?
Blog

By Entrust Datacard

July 23, 2014

When it comes to attacks on enterprise security, few are as powerful or fearsome as malware banking incursions. Because banks are where the real money lies, they also present one of the most lucrative targets for cyberattackers. As a newly emergent strain of banking malware proves, this threat is only becoming greater. Entrust digs deeper to uncover how these connections happen.
Blog

By Entrust Datacard

December 04, 2014

Preventing the tide of Malware takes awareness. It is possible to rid your systems of malware when it's already present. But as organizations with endpoint protection can tell you, business is simply better. It takes a significant burden off IT departments and allows company employees to guide their attention toward the betterment of the business instead of always having to be examining the computer system. In this way, it's a great investment.
Blog

By Entrust Datacard

September 29, 2015

In a business environment, the odds of someone encountering malware are extremely high. As one report revealed, 45 percent of Internet users came up against malware during last year alone. And these days, confronting a malicious strain can often be accompanied by significant repercussions. Among the most common consequences that occur as a result of a malicious infection are changes in operating system settings, unauthorized social media posting, data loss and information theft. For one out of three users who is infected with malware, that intrusion will lead to monetary losses. Considering that almost half of Web users faced malware, it should come as little surprise that enterprises - which have networks accessed by many different people - are particularly vulnerable to intrusions.
Blog

By Bruce Morton

February 06, 2017

Code Signing is a cryptographic process to digitally sign executables and scripts. The signature confirms the software author or publisher’s identity, and provides integrity by guarantying the software has not been altered since it was signed. Minimum Requirements for Code Signing will increase Internet security by setting a new bar to prevent private keys from being compromised. The requirements will also provide a better mechanism to have code signing certificates revoked limiting the proliferation of malware. The result will benefit application software suppliers, online businesses, and of course, software users globally.
Blog

By Bruce Morton

December 19, 2013

A recent article by the Microsoft malware protection center, “Be a real security pro - Keep your private keys private,” reminded me of some best practices.
Blog

By Entrust Datacard

February 28, 2013

Well, this is it. Entrust's final day at RSA Conference 2013. Never fear, friends, we have two of this week's most popular demonstrations on the slate -- "Is It You, Or Is It the Malware?" and "Secure Mobile, Leverage Mobile."
Blog

By Entrust Datacard

February 26, 2013

Entrust’s gearing up for a big, big week. Our go-to guys will focus on four key security areas: cloud, mobility, malware and CJIS compliance.
Blog

By Entrust Datacard

April 26, 2013

Malvertising — or malicious advertising — is getting a bit more attention as of late. In essence, it’s just another method by which criminals attempt to infect user PCs with some form of malware — albeit a very scary form as it can reach so many users so easily.
Page 1 of 2