Featured White Papers
Your approach to vulnerability management may be putting your organisation at greater risk. Just dealing with vulnerabilities that a vendor said were “critical” isn’t enough and may still leave you susceptible to an attack. Attackers are embracing ransomware and other forms of distributed cybercrime made readily available as packaged exploit kits and services on the dark web. These attacker tools target low–hanging fruit by exploiting a surprisingly small number of vulnerabilities, many of which wouldn’t be tagged as a high priority in a purely vulnerability–centric approach.
Most Popular Articles
- 1 Doom's free DLC unleashes hell on hard drives as a ludicrously large update
- 2 Confirmed: Windows 10 will cut off devices with older CPUs
- 3 Best password managers of 2017: Reviews of the top products
- 4 Microsoft's Office sales soar and Windows Phone fades in cloud-happy earnings call
- 5 IBM wants you to encrypt everything with its new mainframe
Join the PC World New Zealand newsletter!
- Old foes call a truce as Google and Microsoft reach patent agreement
- BlackBerry unveils first security-focused Android smartphone
- Lumia 640: Nothing budget about Microsoft’s latest handset
- Intel Core i3 vs i5 vs i7: find out which cpu is better
- Laser vs. inkjet printers: which is better?