Quantcast
Channel: Cyberoam : Securing You » Cyberoam
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

First android ransomware reported

The Cyberoam Internet Threats Trends Report for Q2 2014, prepared in collaboration with CYREN, is out. While attacks on the Android operating system continued to predominate this quarter, the big news...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Alert – Use-After-Free condition detected in Mozilla Firefox

A use-after-free condition affects Mozilla Firefox and can lead to a potential crash on a successful exploit. The condition currently affects Mozilla Foundation Thunderbird prior to 31.1, Mozilla...

View Article


Image may be NSFW.
Clik here to view.

Malware Alert – Apple OS X affected by XSLCmd Backdoor

An APT backdoor named “Backdoor.MacOS.Xslcmd.A” has been found affecting all Apple OS X systems. It has been seen that the malware contacts a remote server to receive commands to execute on the...

View Article

Image may be NSFW.
Clik here to view.

A Mail to Kill: Norway Oil and Energy Industry in midst of A Massive Cyber...

Norway State authorities have warned 300 companies specifically from the oil and energy industry, of being targeted by a coordinated hacker attack[1]. The incident was reported by the local newspaper...

View Article

Image may be NSFW.
Clik here to view.

Cyber Espionage Hits Community Health System Inc.

Personal data belonging to 4.5 million American hospital patients stolen One of the biggest U.S. hospital groups Community Health Systems Inc. has admitted of being victimised of a cyber-attack,...

View Article


Image may be NSFW.
Clik here to view.

Apple Users Becoming #1 Target

The Cyberoam co-branded CYREN Internet Threats Trend report for Q3 is out! Download your copy right away! The report highlights an unusual rise in attacks on Apple platforms, along with CYREN analytics...

View Article

Image may be NSFW.
Clik here to view.

An exclusive security outlook for the year to come -2015!

Cyberoam publishes Security Predictions for 2015 Network Security has been evolving at an astounding rate, and so are the threat trends, with cybercriminals finding innovative and newer ways to exploit...

View Article

Image may be NSFW.
Clik here to view.

Spooky ‘Ghost Vulnerability’ (CVE-2015-0235) keeps Linux users on guard

A buffer overflow vulnerability has been discovered that can allow an attacker to remotely execute code on a Linux computer. It was found in the GNU C Library (glibc)__nss_hostname_digits_dots()...

View Article


Image may be NSFW.
Clik here to view.

Big Opportunities for Cyber Security in Big Data

The US Department of Homeland Security (DHS) is working on an ambitious project which a DHS official reportedly claims is about creating “Weather Maps” for cyber threats. The agency hopes to develop...

View Article


Image may be NSFW.
Clik here to view.

Third Party Vendors – The Weak Links in Network Security

“Your cybersecurity is only as good or bad as that of your vendors.” By 2019, the cyber security market will be worth a mammoth $155.74 billion. The market for next generation security appliances like...

View Article
Browsing latest articles
Browse All 10 View Live