• Topics
    • Advanced IT analytics
    • Application Performance
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:malware protection

Protect your organization against Adrozek

Unified endpoint management and security | December 24, 2020

Protect your organization against Adrozek

Adrozek is a malicious browser modifier that, when installed on users' machines, infects...

How to avoid getting tricked by hackers this Halloween

General | October 29, 2018

How to avoid getting tricked by hackers this Halloween

While everyone prepares for the frights of Halloween, there's a real evil lurking just...

Prevent CowerSnail network breaches with the right patch management solution. 

Endpoint Central | August 4, 2017

Prevent CowerSnail network breaches with the right patch management solution. 

It's hard to keep note of all the malware that's been unleashed in last three months; the...

WannaCry again? Meet Adylkuzz, its sneaky cryptocurrency mining sibling

Endpoint Central | June 30, 2017

WannaCry again? Meet Adylkuzz, its sneaky cryptocurrency mining sibling

More than 400,000 computers wrldwide have been infected with WannaCry ransomware since...

Escape the latest sudo flaw with Desktop Central patch management

Endpoint Central | June 20, 2017

Escape the latest sudo flaw with Desktop Central patch management

Windows has had a rough time lately, dealing with various breaches as the result of...

IT Security | May 18, 2016

What you ought to know about the common cybercrime techniques of 2016

2015 was the year of bold and sophisticated cybercrimes in Australia when major...

Web content filtering with iOS - the browsing comfort zone

Mobile Device Manager Plus | May 2, 2016

Web content filtering with iOS - the browsing comfort zone

Accessing web resources securely is essential for enterprises and educational institutions...

NetFlow Analyzer | March 14, 2012

Network Security Breaches – What to do after?

Network uptime and bottom line go hand in hand for enterprises dependent on online sales....