Enterprise Security

Global Unified Threat Management Market Research Report 2016-2020, is structured with comprehensive market analysis and industry expert’s recommendations. Analysts Forecast Global Unified Threat Management Market to Grow at 14.71% CAGR during the Period 2016-2020. To calculate the market size, the

Finally, by the requests of many, Microsoft has provided a security feature that will be released with the Fall Creators Update. The requested feature known as Pin and Password recovery allows a user to recover his forgotten password directly from

Millions of Samsung products ranging from TVs, smartphones, and cameras are currently running Tizen OS, a Linux based operating system backed by both Samsung Electronics and Intel. A researcher has recently made the claim that Tizen may contain up to

Two implementations of the Kerberos authentication protocol received patches this week against a vulnerability dubbed “Orpheus’ Lyre” that allowed a threat actor to bypass authentication procedures. Researchers tracked down the flaw to Kerberos versions released in 1996. The bug affects

Banking With a Selfie in Argentina ICBC, the largest bank in the world by asset volume, recently embraced facial recognition based security at its Argentinian subsidiary. The biometric security comes via FacePhi’s FIDO Certified mobile authentication platform, Selphi. ICBC customers

LeakerLocker, an Android ransomware that does not encrypt files but rather collects data from the android device such as pictures, messages and browser history and tends to share it with the persons contact if the ransom is not paid. The

One of the favourite pieces of software for malicious hackers to target on users’ computers is Adobe Flash Player. Why? Well, there are a few reasons. Firstly, Adobe Flash Player is on an awful lot of computers. Many users may

Computer security biz Preempt warned last October that Microsoft NT LAN Manager (NTLM) should be avoided. On Tuesday, it plans to support its assessment by going public with details of two vulnerabilities. NTLM is an old authentication protocol. Though it