You searched for dormant | Page 4 of 11 | SC Media

Your search for dormant returned 103 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Your search for dormant returned 103 results

Sort Results:

Relevant Recent
Executive Insight

Open source in your data center – what you should know

Open-source software started out as a grassroots movement and morphed in a short time into a mega-industry. Today, open-source code boosts modern business application delivery – allowing development and operation teams to be more agile, enjoy solutions that are custom-fit to their needs, and lower development and rollout costs.  There’s no question that open-source solutions…
Security News

Whew! Did all that just happen?

Looking back and forward, the view’s very nearly the same. Threats, threats and more threats. Teri Robinson reports. Out with the old. In with the new. That’s the way the New Year works, right? Except in cybersecurity. The old threats never really go away as the devastating WannaCry, a new twist on an old bug,…
hacker
Government/Defense

Pro-ISIS hackers threaten to launch cyberattack on Dec. 8

Pro-ISIS hackers have reportedly posted a video threatening to launch a global cyberattack on government, military, and corporate websites on Friday, Dec. 8 – with the U.S. as its first target. “We will face you with a massive cyber war,” warns the group, known as the Electronic Ghosts of the Caliphate or Caliphate Cyber Ghosts,…
Executive Insight

Identity Analytics: The New Face of IAM

For years, traditional rules-based identity and access management (IAM) systems have been the primary means used by organizations to control identities, access and compliance. The emergence of distributed applications (on-premises, cloud and mobile), mobile workforces and fast-moving business priorities have generated a massive increase in the number identities and access requests that need to be…
Ransomware

Ransomware Resurrected

As Stephen King once put it, “Sometimes they come back.”  Like a dormant volcano that may suddenly awaken at any moment, ransomware programs are an unpredictable lot. They may lay low for a while, or fall out of favor. But then they reemerge, often with new tricks up their sleeve. Indeed, ransomwares never truly die…
Locky Ransomware
Ransomware

Locky makes a strong comeback, propelled by botnet-fuel spam campaign

Reports have been pouring in this month about the sudden return of Locky ransomware, which had been largely dormant in 2017. In short order, researchers have discovered two new major versions of Locky being distributed via voluminous malspam campaigns. The first variant to emerge is a version called Diablo6, named after the .diablo6 file extension…
Next post in Features