Security News > 2018 > April
![Can existing endpoint security controls prevent a significant attack?](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Endpoint security solutions are failing to provide adequate protections to address today’s security threats, specifically malware, according to Minerva Labs. A majority of the respondents surveyed...
![5 things you should know about fileless malware attacks](/static/build/img/news/alt/cyberthreat-stats-small.jpg)
Cybersecurity threats evolve quickly, and attackers are increasingly using tactics that don't require a payload or tricking someone into installing something. Here's what you need to know about...
![Better code won’t save developers in the short run](/static/build/img/news/alt/phishing-stats-2-small.jpg)
According to OWASP, “Insecure software is undermining our financial, healthcare, defense, energy and other critical infrastructure.” In its 2017 OWASP Top 10 Most Critical Web Application Security...
![Global AI business value to reach $1.2 trillion in 2018](/static/build/img/news/alt/data-statistics-small.jpg)
Global business value derived from artificial intelligence (AI) is projected to total $1.2 trillion in 2018, an increase of 70 percent from 2017, according to Gartner. AI-derived business value is...
![New NSA/Cyber Command Head Confirmed by Senate](/static/build/img/news/alt/cost-stats-small.jpg)
It's Lt. Gen. Paul Nakasone. I know nothing about him....
![Hackers build a 'Master Key' that unlocks millions of Hotel rooms](/static/build/img/news/alt/cyber-threat-stats-small.jpg)
If you often leave your valuable and expensive stuff like laptop and passports in the hotel rooms, then beware. Your room can be unlocked by not only a malicious staff having access to the master...
![Microsoft Releases More Microcode Patches for Spectre Flaw](/static/build/img/news/alt/cyber-threat-stats-small.jpg)
Microsoft this week released another round of software and microcode updates designed to address the CPU vulnerability known as Spectre Variant 2. Microsoft has been releasing software mitigations...
![How to automate Apple's FileVault 2 deployment and configuration](/static/build/img/news/alt/mac-stats-small.jpg)
The way you deploy Apple's full-disk encryption scheme will impact how end users use their hardware and how IT manages these devices. Here are three tips on automating the deployment of FileVault 2.
![Picture This. Now Protect It.](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
An astonishing amount of sensitive data – over 12 petabytes – is being exposed publicly. If you’re having difficulty visualizing what 12 petabytes is, this might help. One petabyte is the...
![Hyperoptic's ZTE-made 1Gbps routers had hyper-hardcoded hyper-root hyper-password](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Firmware updates pushed out to up to 400,000 subscribers A security vulnerability has been found in Brit broadband biz Hyperoptic's home routers that exposes tens of thousands of its subscribers...