Según una encuesta realizada por ESET, el 50% de los usuarios que dijo que no hace backup de su información porque no sabe cómo hacerlo.
Leer másSe trata de dos vulnerabilidades que según la compañía probablemente estén siendo explotadas activamente por atacantes.
Leer másOn May 12, 2020, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD), released three new Malware Analysis Reports (MARs) on malware used by the North Korean government.
Leer másOn April 15, 2020, the U.S. Departments of State, the Treasury, and Homeland Security, and the Federal Bureau of Investigation released joint guidance on North Korea’s malicious cyber activities, including recommended steps to mitigate the threat.
Leer másOn August 3, 2020, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD), released a new Malware Analysis Report (MAR) on malware used by the Chinese government.
Leer másOn October 31, 2019, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) identified a Trojan malware variant—referred to as HOPLIGHT—used by the North Korean government.
Leer másAkamai MFA: Phishing-Proof Multi-Factor Authentication to Prevent Employee Account Theft and Data Breaks
Leer másMore than 70% of data theft involved large companies and most of those attacks are perpetrated by external actors.
Leer másThe scam caused him to lose a large part of his savings. It was a fraudulent sweepstakes in which an account posing as Elon Musk offered double the winnings.
Leer másThe need to send data or voice wirelessly between people, between machines or between people and machines has led to the development of multiple systems, technologies and protocols.
Leer más