Attackers used phishing and zero-days to infect Windows, Mac, and Linux users.
Category: Naked Security
It’s probably no surprise to all of you that there has been a significant amount of talk about Business Architecture in recent years. Just coming back from the Open Group Conference in San Franci
Maybe too late, but retailers need better security after this season’s breaches.
Threats seem to be top of mind for the masses of late—with three large-scale attacks on major brands already this year, potentially compromising the financial data and identity of millions. A