Filter Blogs expand_more
Blog add
Authors add
19 Results for 'malware'
Blog

Entrust at RSA: "Is It You, Or Is It the Malware?"

By Entrust Datacard
February 27, 2013
In case you missed it, Entrust’s Jason Soroko (@jasonsoroko), who’s head of malware research, is doing real-time, split-screen key-logging demos via Metasploit, an anti-forensic and evasion detection tool. It’s live. It’s cool. And it’s going on each day at Entrust Booth 1139.
Blog

Why Your Network is Failing to Stop Malware

By Entrust Datacard
October 01, 2013
The network of your enterprise is outfitted with antivirus and firewall software to help safeguard against certain types of malware. This software stops most common strands of malware from entering your system and wreaking havoc on your network and devices. But is it enough?
Blog

Amid New Malware Strains, A Need For Businesses To Increase Protection (Part 1 of 2)

By Entrust Datacard
September 29, 2015
In a business environment, the odds of someone encountering malware are extremely high. As one report revealed, 45 percent of Internet users came up against malware during last year alone. And these days, confronting a malicious strain can often be accompanied by significant repercussions. Among the most common consequences that occur as a result of a malicious infection are changes in operating system settings, unauthorized social media posting, data loss and information theft. For one out of three users who is infected with malware, that intrusion will lead to monetary losses. Considering that almost half of Web users faced malware, it should come as little surprise that enterprises - which have networks accessed by many different people - are particularly vulnerable to intrusions.
Blog

New Banking Malware Poses Big Threat

By Entrust Datacard
July 23, 2014
When it comes to attacks on enterprise security, few are as powerful or fearsome as malware banking incursions. Because banks are where the real money lies, they also present one of the most lucrative targets for cyberattackers. As a newly emergent strain of banking malware proves, this threat is only becoming greater. Entrust digs deeper to uncover how these connections happen.
Blog

Most Dangerous Malware Impacting Businesses

By Entrust Datacard
December 04, 2014
Preventing the tide of Malware takes awareness. It is possible to rid your systems of malware when it's already present. But as organizations with endpoint protection can tell you, business is simply better. It takes a significant burden off IT departments and allows company employees to guide their attention toward the betterment of the business instead of always having to be examining the computer system. In this way, it's a great investment.
Blog

The Current State of Retail Cybersecurity

By Entrust Datacard
February 02, 2016
Since 2014, POS cybersecurity has only become more contentious. New strains of sneaky, memory-scraping malware have been identified by security experts. In the past few months alone, multiple hotel chains, including Hilton and Hyatt, have announced breaches that may have resulted in credit card information of guests being stolen. 
Blog

Bad Actors Catalyst Behind New Standards for Code Signing

By Bruce Morton
February 06, 2017
Code Signing is a cryptographic process to digitally sign executables and scripts. The signature confirms the software author or publisher’s identity, and provides integrity by guarantying the software has not been altered since it was signed. Minimum Requirements for Code Signing will increase Internet security by setting a new bar to prevent private keys from being compromised. The requirements will also provide a better mechanism to have code signing certificates revoked limiting the proliferation of malware. The result will benefit application software suppliers, online businesses, and of course, software users globally.
Blog

Protect Your Private Keys: Three Easy Steps for Safe Code-Signing

By Bruce Morton
December 19, 2013
A recent article by the Microsoft malware protection center, “Be a real security pro - Keep your private keys private,” reminded me of some best practices.
Blog

Entrust at RSA: The Final Day

By Entrust Datacard
February 28, 2013
Well, this is it. Entrust's final day at RSA Conference 2013. Never fear, friends, we have two of this week's most popular demonstrations on the slate -- "Is It You, Or Is It the Malware?" and "Secure Mobile, Leverage Mobile."
Blog

Entrust at RSA: The Week Ahead

By Entrust Datacard
February 26, 2013
Entrust’s gearing up for a big, big week. Our go-to guys will focus on four key security areas: cloud, mobility, malware and CJIS compliance.
Page 1 of 2