- Tor hints at possible U.S. government involvement in recent attack
- Internet of Things devices contain high number of vulnerabilities, study finds
- Antivirus products riddled with security flaws, researcher says
- 'Right to be forgotten' ruling is unworkable and misguided, UK Lords say
- Defunct Koler ransom Trojan attacked 200,000 Android users in matter of weeks
Traditional antivirus products are based on signature recognition performed on endpoints. That is a failing strategy for a number of reasons. It is no wonder most information security experts question the ability of signature-based antivirus products to block the newest and most dangerous forms of malware. Read more.
Please supply your email address to access the content.
- Slow UC deployment costs Anittel a profitable year
- 2014 FIFA World Cup Championship match traffic pipped by semi final
- Financial services chiefs back technology as key enabler: Financial Service Council
- Blue Jeans Network launches new video service with Google Hangouts
- Data#3 spends $2.5m on first phase of Discovery takeover