Web Isolation

18 Entries
 
 
3 years ago
Be the first person to recommend this.

For the past few years the Symantec Web Isolation team (formerly Fireglass) has warned customers that web browsers are dangerous because malicious websites exploit browser vulnerabilities ...

3 years ago
Be the first person to recommend this.

Google’s Project Zero team has revealed another security vulnerability exploiting Microsoft’s Edge and IE browsers on various windows versions (Windows 7/8.1/10 and Windows Server 2012/2012 ...

Attachments
3 years ago
Be the first person to recommend this.

All organizations know that the cyber threat landscape is getting more dangerous all the time. Yesterday’s amateur hackers who were motivated to destroy machines and wreak havoc have ...

3 years ago
Be the first person to recommend this.

While hackers are constantly exploiting new vulnerabilities in their victims’ network defense system, there is an “old favorite” in the data breach playbook that was first identified ...

4 years ago
Be the first person to recommend this.

As discussed in an earlier post (When You Can’t Tell Good From Bad ), it is not always possible to categorize IT security threats in order to successfully prevent the injection of malware ...

4 years ago
Be the first person to recommend this.

Since early 2015, the number of incidents of “ransomware” attacks has escalated dramatically , with further growth in the number of these attacks expected in 2016. Just recently, a ...

Attachments
5 years ago
Be the first person to recommend this.

Entities are at the core of reasoning, with some scientists claiming it is the foundation of language and reasoning. Indeed in the textbook “Animal Cognition ” it is written that categorization ...

5 years ago
Be the first person to recommend this.

2015 is on its way to becoming the year of Adobe Flash exploits. In the first quarter of 2015, 48 different Flash vulnerabilities were discovered, a sharp increase from the 28 Flash ...