Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom Lenovo Newsroom Nutanix Newsroom Cisco Live Newsroom HPE Zone Tech Provider Zone

Data Breach Security From A To Z

Financially motivated cybercriminals, hacktivists and nation-state-sponsored groups are conducting attacks on corporate networks on a daily basis. To keep up to speed, here's everything you need to know about data breach security from A to Z.

Back 1   2   3   ... 13 Next

Black Hole Attack Toolkit

The Black Hole attack toolkit is the most widely used by cybercriminals. The toolkit is licensed out and can be customized and updated with exploits that target the latest known vulnerabilities. Occasionally, the kit contains an exploit targeting a known zero-day vulnerability. Attackers use the tool to set up a malicious Web page with JavaScript that determines the vulnerable software on a victim's machine. Patching can seriously reduce the threat of being a victim of Black Hole, say security experts, who urge users to keep their browsers up to date with the latest security updates and ensure that browser components, such as Java and Adobe Flash, are kept current on patching.

Back 1   2   3   ... 13 Next

sponsored resources