Security Article

What is an Advanced Persistent Threat (APT)

Advanced persistent threat (APT) is commonly used to refer to cyber threats, in particular that of Internet-enabled espionage using a variety of intelligence gathering...

Facebook Security Infographic

In this infographic you can find out more about our security infrastructure and an overview of the tools available to all our users to...

Cryptolocker Ransomware: What You Need To Know

A new version of Cryptolocker—dubbed Cryptolocker 2.0—has been discovered by ESET, although researchers believe it to be a copycat of the original Cryptolocker after...

Six Simple Steps to Enterprise Risk Management

Enterprise risk management is a scalable, holistic approach to improved decision-making that consolidates and organizes risk information from across an organization. No longer limited...

Sneaky new Android Trojan is WORST yet discovered

Security researchers at Kaspersky Lab report that a recently discovered Android Trojan is the most sophisticated such mobile malware yet to be identified. In a...

Security Twitteratti: Twitter’s 2FA does sweet FA for biz

Security-watchers don't appear overly impressed with Twitter's introduction of two-factor authentication (2FA) to its service. While some infosec experts welcomed the move, others argued that...

How The NSA Deploys Malware: An In-Depth Look at the New...

We've long suspected that the NSA, the world's premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article...