Mobile Applications Security Problems as a Result of Insufficient Attention of Developers

In the second half of 2017, developers uploaded about 2800 applications on Google Play on a daily basis. Each of these applications contains a certain amount of data that is stored or transmitted via…
Go on to the site to read the full article
The po… Continue reading Mobile Applications Security Problems as a Result of Insufficient Attention of Developers

It Is Not Always Necessary to Get User Consent Under the New GDPR Regulation

This article is for those businesses that serve customers in the European Union. This article explains why you should not always ask the customer for his permission to process personal data. GDPR and…
Go on to the site to read the full article
The po… Continue reading It Is Not Always Necessary to Get User Consent Under the New GDPR Regulation

Insider Threat: How to Protect Your Business from Your Own Employees

It’s trite to write that the company’s data and customer base are the main assets of any business in the 21st century. However, the attitude to these assets is still careless: a sales…
Go on to the site to read the full article
The post I… Continue reading Insider Threat: How to Protect Your Business from Your Own Employees

Top 10 Solutions to Protect Against DDoS Attacks and Increase Security

According to statistics, 33% of businesses fall victim to DDoS attacks. It is almost impossible to predict such attacks. Some of them can be powerful and reach 1.35 TBps. According to Incapsula, DDoS…
Go on to the site to read the full article
The po… Continue reading Top 10 Solutions to Protect Against DDoS Attacks and Increase Security

Ransomware Chronicle

This is a comprehensive report on ransomware-related events covering a time frame of May – December 2016. The incidents herein are visually broken down into categories, including new ransomware, updates of existing strains, decryptors released, and other noteworthy news. Security researchers and users interested in the ransomware subject can now use this all-in-one knowledgebase instead […] Continue reading Ransomware Chronicle