Whether by dumb luck or ruthless skill, these malware attacks left their mark on the internet.| CSO Online
A botnet is a collection of internet-connected devices that an attacker has compromised to launch DDoS attacks, spread phishing spam, mine bitcoin, and more.| CSO Online
Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. Train yourself to spot the signs.| CSO Online
Phishing is a type of cyberattack that uses disguised email to trick the recipient into giving up information, downloading malware, or taking some other desired action.| CSO Online
Ransomware is a form of malware that encrypts or blocks access to a victim’s files, data, or systems until a ransom is paid. Here’s what you need to know to avoid being a victim and what to do if you fall prey to cyber criminals.| CSO Online
Security information and event management software collects information to help identify and track cyber breaches. Here’s how to select the best SIEM product based on your company’s needs.| CSO Online
The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here's how to do it.| CSO Online
WannaCry is a virulent ransomware attack that was designed by a North Korean hacker gang and takes advantage of a Windows vulnerability that remains unpatched on too many computers.| CSO Online
Thanks to Stuxnet, we now live in a world where code can destroy machinery and stop (or start) a war.| CSO Online