https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png 0 0 Karen Taylor https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png Karen Taylor2017-10-27 15:16:042018-05-24 14:28:16SC Magazine: Top Six Spookiest Malware for Halloween
October 27, 2017 — Top Six Spookiest Malware for Halloween NuData’s Don Duncan chimes in on SC’s piece about some of the spookiest malware security professionals have encountered. 5. CCleaner Don Duncan (NuData) Customer Success Engineer “The stuff was already preinstalled on ‘haunted hardware’ when the customer purchased it. The one thing that caught my attention was that it was shipped with new hardware. By the way, I was one of those effected having just bought a new Android device. …
https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png 0 0 Karen Taylor https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png Karen Taylor2017-10-02 10:56:582018-05-16 12:56:20SC Magazine: Alive and Kickin'
October 2, 2017 — Alive and Kickin’ Robert Capps, VP at NuData, contributes with his expert comments on this article covering the health of ransomware and what that means in today’s cybersecurity world. “There’s a natural technical evolution in ransomware that’s underway, driven by the success and failures of recent mass-scale campaigns to hold users ransom,” says Robert Capps, authentication strategist, vice president, NuData Security. “With so many organizations all anteing up in Bitcoin simultaneously, the perpetrators struggled to collect …
https://nudatasecurity.com/wp-content/uploads/2017/01/Hacker2.jpg 1414 2120 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2017-01-09 11:04:502017-01-17 13:24:05What Drives Hackers? (Part 1)
What Drives Hackers? (Part 1) What are the payoffs for hackers to join the game and what are their favorite tools? 2016 was a year of major breaches. The list of target companies and organizations is long, including the IRS, US Dept. of Justice, LinkedIn, Twitter, Dropbox, Yahoo, Adult FriendFinder, Zoosk, Cisco, and the biggest breach in history – Yahoo with its one billion user accounts. A year where Internet security was tested again and again. So, what motivates hackers …
Still have questions?
Call: +1 (604) 800-3711
* These fields are required.