Trang tin tức - Bitdefender Vietnam
Chào mừng đến với trang tin tức Bitdefender
Sẵn sàng hỗ trợ 24/7! Trả lời các câu hỏi và giải quyết các vấn đề kỹ thuật của khách hàng.
Cryptocurrency miners have become such a problem that Google is taking a radical measure to protect customers from stealthy miners disguised as legitimate browser extensions – banning any miner that even approaches its Chrome web store.
Speed is the critical factor in mitigating the damage of a cyber attack, and will remain so for the foreseeable future. This is according to 74 percent of the C–level information security executives who participated in our brand new Small Gains, Big Wins Study, which looks at the cyber security attitudes of 250 CIOs/ CISOs/ CSOs in UK-based companies with 500+ employees.
เพื่อนๆเคยเล่นควิซเกมบนเฟซบุ๊คกันไหมคะ ? พวกคำถามขำๆ แบบทดสอบตลกๆ เกมเหล่านี้เล่นฟรีจริง แต่รู้หรือไม่ว่า โปรแกรมอะไรที่มาพร้อมกับเกม ? มันคือโปรแกรมขุดเจาะที่จะเอาข้อมูลส่วนตัวของท่านไปใช้งานต่อไป
Following the Cambridge Analytica scandal, some users reported on Twitter that they downloaded their profile data to figure out exactly what kind of information the social network keeps on them.
In July 2017, The New York Times reported that hackers had been infiltrating the networks of nuclear power stations and energy facilities in the US and elsewhere by targeting employees, such as control engineers.
As enterprises bridge their adoption patterns for public cloud from isolated pilot projects to fully scaled environments, they're going to need to get serious about adjusting their cybersecurity strategy and architecture to accordingly.
For IT, combining public and private cloud into a hybrid datacenter has always held tremendous promise. Imagine getting a call from accounting because they unexpectedly need to re-run hardware-intensive workloads for two weeks. The problem is that with all the production workloads running and development stress-testing a major application, your on-premises infrastructure is already being fully consumed; there is simply no capacity left for the accounting team.
Recent months have seen a dramatic reshaping of the cyber security threat landscape, according to the “Global Threat Landscape Report—2017,” by Bitdefender. More traditional threats such as generic Trojans, ransomware attacks, and spam bots have been complemented in a big way by data destructors. Powered by military-grade code allegedly leaked from the U.S. National Security Administration (NSA), both WannaCry and GoldenEye wrought havoc throughout the second and third quarters of 2017, shutting down businesses and causing unprecedented operating losses, the report said.
Mozilla Firefox released an update to patch its open-source web browser after developer Johann Hofmann detected a critical HTML flaw that could allow hackers to exploit the browser remotely. The vulnerability only affected the desktop version of Firefox, and not iOS, Android and Amazon Fire TV versions.