Remove Applications Remove Malware Remove Security
article thumbnail

Nexus Android malware targets 450 financial applications

Tech Republic Security

The post Nexus Android malware targets 450 financial applications appeared first on TechRepublic. Learn how to protect your organization and users from this Android banking trojan.

Malware 213
article thumbnail

Dell Data Protection Protected Workspace & Malware Prevention

CTOvision

The video below explores DDP Protected Workspace and uniquely addresses healthcare regulations related to malware prevention. Individuals take malware and obtain the characteristics pertaining to the individual and find ways to get around the malware inspections in place. The malware is from external agents.

Malware 259
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Xenomorph Android malware targets more than 50 banking and financial applications

Tech Republic Security

Some banking malware targets mobile devices and can quickly steal money from banking accounts. Meet Xenomorph, a new malware targeting Android and more than 50 banking and financial applications. The post New Xenomorph Android malware targets more than 50 banking and financial applications appeared first on TechRepublic.

Malware 206
article thumbnail

Why traditional malware detection can't stop the latest security threats

Tech Republic Security

Isolating your hardware and your applications is a more effective way to prevent malware from infecting your critical endpoints, says HP.

Malware 214
article thumbnail

Threat Actors Exploit Telegram Zero-Day Vulnerability Hiding Malware in Video Files

IT Toolbox

Telegram has patched a zero-day flaw in its Android application that allows attackers to hide malicious payloads in video files. The post Threat Actors Exploit Telegram Zero-Day Vulnerability Hiding Malware in Video Files appeared first on Spiceworks Inc. Learn more about the flaw and how it affects Telegram users.

Malware 234
article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

By Bob Gourley We often highlight the importance of applying security controls to your enterprise. As a review, they are: 20 Critical Security Controls – Version 4.1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. Malware Defenses. Secure Network Engineering.

Security 278
article thumbnail

Enterprise IT in 2014 – Under-the-Radar Challenges with WAN Bandwidth, BYOD, and XP Security

CTOvision

Careful testing and limited pilot deployments are perennial success strategies with WAN-trafficking applications. Bandwidth-optimizing technologies and applications can also be good investments. Securing these devices is nearly impossible because they are not corporate controlled. XP Will Cause Significant Security Issues.

WAN 273