Security – The macro-less malware attacks
Recent researches from Sophos indicating a new method used by attackers to exploit vulnerabilities in Microsoft products. The new series of malwares uses word, excel ...
Recent researches from Sophos indicating a new method used by attackers to exploit vulnerabilities in Microsoft products. The new series of malwares uses word, excel ...
GDPR – General Data Protection Regulation – The new legislation for data privacy from European Union You probably heard about the GDPR in the news ...
After Sony breaches and now the infamous Equifax data leakage, the discussion about data protection makes headlines again. That´s not first time we see big ...
SECURITY THREATS -A MATTER OF "WHEN" AND NOT "IF" IT WILL HAPPEN “The art of war teaches us to rely not on the likelihood of ...
Goodbye to 11ac Wave 1, start embracing 11ac Wave 2 Technology in Wireless Access Points There is everlasting demand for better user experience and better ...
Manage your vulnerabilities Part of the actions in the effort to keep the environment safe of threats is to have a good visibility over the ...