Remove 2010 Remove Antivirus Remove Encryption Remove Phishing
article thumbnail

The History of Computer Viruses & Malware

eSecurity Planet

Though polite, the Creeper was still an annoyance to some, and in 1971, Ray Tomlinson developed the first antivirus software , called Reaper. One of the first pieces of antivirus software , McAfee’s VirusScan, was released in 1987. Going Mobile and Going Global: 2001-2010. It later evolved to also include file encryption.

Malware 140
article thumbnail

Top Cybersecurity Companies for 2021

eSecurity Planet

The solution includes cloud sandboxing technology, preventing zero-day threats, and full disk encryption capability for enhanced data protection. ESET Protect Advanced complies with data regulation thanks to full disk encryption capabilities on Windows and macOS. Get started today! Learn more about ESET PROTECT Advanced. Founded: 1911.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Security services and tools include anti-DDoS , SOCaaS , web application firewalls (WAF), data encryption , and more. Other features include applying secure socket layer (SSL) or transport layer security (TLS) and AES-256 encryption. Also Read: Best Encryption Software & Tools for 2021. EnterpriseDB.

Firewall 117
article thumbnail

6 Dangerous Microsoft Office 365 Security Concerns for Business

Spinone

Your employee’s password to Office 365 might get cracked or stolen during a phishing attack. Keep your antivirus software up to date. However, don’t forget that even an updated antivirus may not detect advanced malware strains. Cybercriminals can sell you information or encrypt it with ransomware to demand money.

article thumbnail

Mystic Stealer

Security Boulevard

Enter Mystic Stealer, a fresh stealer lurking in the cyber sphere, noted for its data theft capabilities, obfuscation, and an encrypted binary protocol to enable it to stay under the radar and evade defenses. Example Mystic Stealer constant obfuscation technique Encrypted binary custom protocol. All data is encrypted with RC4.

article thumbnail

EP 49: LoL

ForAllSecure

Hanslovan: So we noticed it was a trend like all things cat and mouse base and hackers were really getting ticked off that their malicious payloads were getting caught by the antivirus. Why don't I use the trusted ones that I'll get by antivirus. N etwork Chuck : Let's say I receive an email, a phishing email.