Knowledge Is Power: Using Cyber Scrutiny To Defend Against Phishing Attacks

Knowledge Is Power: Using Cyber Scrutiny To Defend Against Phishing Attacks

If you purchased an iPhone 6 recently, you probably received this email: Some of you may have even clicked the “Verify Now” link and entered your Apple ID account information. I hope not, though, because this email is not from Apple. It’s a phishing email meant to trick recipients into giving sensitive information to the [...]

Tracking New Ransomware CryptoWall 2.0

Tracking New Ransomware CryptoWall 2.0

The latest development in the ransomware world is CryptoWall 2.0, a new version of this malware family that uses the Tor network for command and control. F-Secure was the first to spot this new version on October 1, but since then the attacks have ramped up and new variants of the malware are emerging daily. [...]

Got Advanced Endpoint Protection? Use Our New Documentation to Get Started!

Got Advanced Endpoint Protection? Use Our New Documentation to Get Started!

Palo Alto Networks Advanced Endpoint Protection is a complete paradigm shift from identification to pure prevention. Our solution requires no definitions updates, protects unpatched systems, requires no hardware, is compatible with all physical or virtual Windows platforms including terminals, VDIs, VMs, and embedded systems, protects all processes including third party, and most importantly, doesn’t need [...]