Story image

The cyber threats you’ll face in 2017 - and tips for defending against them

23 Feb 2017

What can send an organisation into chaos within a matter of seconds?

Malware and ransomware are two threats that are often in the limelight and don't seem to be going anywhere anytime soon. 

They are constant and malicious and according to Webroot, there are new trends surrounding these threats being created all the time.

Most recently, the threat intelligence company has uncovered the prevalence of a trend dubbed 'polymorphism'.

For several years, the most important trend in malware and potentially unwanted application (PUA) executables has been polymorphism. 

These threats are generated by attackers in ways that make each instance unique. 

To find out more about polymorphism, malicious mobile apps and other threat trends, download Webroot’s 2017 Threat Report below.

What you’ll gain from this report:

  • Invaluable analysis and insight from the Webroot Research team
  • Steps to protect against the latest threat trends
  • Knowledge to future-proof your business against hidden threats
  • Important information sourced from more than 600 million domains, 4 million IP addresses and 50 million mobile apps
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.