The purpose of this article is to cover the challenges SMBs are facing when it comes to using authentication methods to protect their online websites and applications, and comparing a number of two fa ...
Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and in general of mobile cyber threats. Mobile botnets are malicious infrastructur ...
Checkmarx’s report analyzed the security of the top 50 most popular plugins (in general), as well as the top 10 most popular ecommerce plugins. Today we published our report “The Security State o ...
A new variant of Zeus trojan is offered for sale in the underground. It is a Self-propagating version that exploits Facebook, the RDP and the email. The criminal history taught us that after the diff ...