Tag: Malware

IBM Announces Intention to Acquire Trusteer

Attackers are becoming more sophisticated and their malware more difficult to detect and block. New solutions are needed. Today, IBM is announcing the acquisition of Trusteer, a leader in combatting web fraud and the defense against advanced...

So, You Got Infected. What Now?

When systems are infected, it is important to apply additional post-infection controls that prevent malware from compromising the endpoint.

Why Enterprises Should Fear Their Mobile Application Users

Need to convey how enterprise data is at risk from malware that infects the mobile devices of their users. The malware mines for user and enterprise data on the mobile device. If enterprise mobile applications are insecure not protected data is at...