Filter Blogs expand_more
Blog add
Authors add
19 Results for 'malware'
Blog

By Entrust Datacard

September 29, 2015

In a business environment, the odds of someone encountering malware are extremely high. As one report revealed, 45 percent of Internet users came up against malware during last year alone. And these days, confronting a malicious strain can often be accompanied by significant repercussions. Among the most common consequences that occur as a result of a malicious infection are changes in operating system settings, unauthorized social media posting, data loss and information theft. For one out of three users who is infected with malware, that intrusion will lead to monetary losses. Considering that almost half of Web users faced malware, it should come as little surprise that enterprises - which have networks accessed by many different people - are particularly vulnerable to intrusions.
Blog

By Entrust Datacard

February 27, 2013

In case you missed it, Entrust’s Jason Soroko (@jasonsoroko), who’s head of malware research, is doing real-time, split-screen key-logging demos via Metasploit, an anti-forensic and evasion detection tool. It’s live. It’s cool. And it’s going on each day at Entrust Booth 1139.
Blog

By Entrust Datacard

October 01, 2013

The network of your enterprise is outfitted with antivirus and firewall software to help safeguard against certain types of malware. This software stops most common strands of malware from entering your system and wreaking havoc on your network and devices. But is it enough?
Blog

By Entrust Datacard

July 23, 2014

When it comes to attacks on enterprise security, few are as powerful or fearsome as malware banking incursions. Because banks are where the real money lies, they also present one of the most lucrative targets for cyberattackers. As a newly emergent strain of banking malware proves, this threat is only becoming greater. Entrust digs deeper to uncover how these connections happen.
Blog

By Entrust Datacard

December 04, 2014

Preventing the tide of Malware takes awareness. It is possible to rid your systems of malware when it's already present. But as organizations with endpoint protection can tell you, business is simply better. It takes a significant burden off IT departments and allows company employees to guide their attention toward the betterment of the business instead of always having to be examining the computer system. In this way, it's a great investment.
Blog

By Entrust Datacard

May 20, 2015

If you have ever read even a little bit of cybersecurity news, you're bound to hear terms like "virus," "malware," "spyware," and "DDoS attack" thrown around with some frequency. The terms can quickly blur together, and it can become difficult to differentiate between them. Yet businesses operating today need to be able to make distinctions between all the threat types out there, since each and every one poses a unique risk to enterprises. Unfortunately, many business IT departments are not prioritizing cybersecurity at all, let alone setting aside time to learn about the separate threat types that exist. The lack of a proactive cybersecurity strategy within many businesses is not just problematic — it also plainly does not make sense.
Blog

By Entrust Datacard

May 11, 2015

The U.S. Center for Disease Control and Prevention has its headquarters in Atlanta. Every time there is a major disease outbreak — or even concerns about one — the CDC makes headlines. It was at the center of the United States' response to the Ebola scare last year. More recently, it reported on the first apparent instance of the transmission of plague via dog to human. When there is a disease story making the rounds, the CDC is on the scene. In a recent article for Forbes, Dave Lewis pointed out that the treatment of infectious diseases was an evolving but somewhat scattershot affair before the emergence of a centralized hub. 
Blog

By Bruce Morton

December 19, 2013

A recent article by the Microsoft malware protection center, “Be a real security pro - Keep your private keys private,” reminded me of some best practices.
Blog

By Entrust Datacard

February 28, 2013

Well, this is it. Entrust's final day at RSA Conference 2013. Never fear, friends, we have two of this week's most popular demonstrations on the slate -- "Is It You, Or Is It the Malware?" and "Secure Mobile, Leverage Mobile."
Blog

By Entrust Datacard

April 26, 2013

Malvertising — or malicious advertising — is getting a bit more attention as of late. In essence, it’s just another method by which criminals attempt to infect user PCs with some form of malware — albeit a very scary form as it can reach so many users so easily.
Page 1 of 2