• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: malware

ITaaS: Multi-Layered Security Against Ransomware for SMBs

Ransomware isn’t only a threat to large corporations. IT as a Service (ITaaS) and multi-layered security could be the answer for small businesses too.

July 17, 2017 Andrew Bunyi Leave a Comment

Ransomware isn’t only a threat to large corporations. IT as a Service (ITaaS) and multi-layered security could be the answer for small businesses too.

Read More

who got hacked

Who Got Hacked This Week? July 14 Edition

What types of cyberattacks were carried out this week, July 14, 2017? Read on to find out about the latest cyberattacks and who got hacked this week.

July 14, 2017 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, July 14, 2017? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

NETGEAR Delivers Enterprise Network Storage at Affordable Price

ReadyNAS RR2304 from NETGEAR delivers full data protection, disaster recovery, and seamless file sharing with 1.5 times the processing power of the previous model.

July 10, 2017 TechDecisions Staff Leave a Comment

ReadyNAS RR2304 from NETGEAR delivers full data protection, disaster recovery, and seamless file sharing with 1.5 times the processing power of the previous model.

Read More

Technology Installers Explain Considerations of BYOD

Bring your own device (BYOD) can be a headache for any institution. We asked AV integrators and IT providers for advice on BYOD. Check out their answers here!

June 28, 2017 TechDecisions Staff Leave a Comment

Bring your own device (BYOD) can be a headache for any institution. We asked AV integrators and IT providers for advice on BYOD. Check out their answers here!

Read More

Cyber Security

How Does Fileless Ransomware Work?

Fileless ransomware uses a clever bit of trickery to get around antivirus programs. Here’s how it works.

June 7, 2017 Con Mallon Leave a Comment

Fileless ransomware uses a clever bit of trickery to get around antivirus programs. Here’s how it works.

Read More

who got hacked

Who Got Hacked This Week? June 2 Edition

What types of cyberattacks were carried out this week, June 2, 2017? Read on to find out about the latest cyberattacks and who got hacked this week.

June 2, 2017 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, June 2, 2017? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

Internet-Security-Threat-Report

New Internet Security Threat Report Dives Deep into 2016 Cyber Security

Organizations can gain great insight into the types of attacks being carried out and how to prevent them from affecting their business from the Internet Security Threat Report.

May 15, 2017 TechDecisions Staff Leave a Comment

Organizations can gain great insight into the types of attacks being carried out and how to prevent them from affecting their business from the Internet Security Threat Report.

Read More

Capture, Stream and VOD Are Aim for BTX in Product Expansion

BTX is expanding the Reach line of products and hiring Carl D’Agastino in order to strengthen emphasis on video on demand, capture and streaming.

March 7, 2017 TechDecisions Staff Leave a Comment

BTX Technologies recently announced the company will strengthen its capture, streaming and VOD capabilities with the expansion of the Reach product line and the addition of Carl D’Agostino to the staff as AV over IP business manager. Reach offers video encoding, live streaming and VOD distribution from either a single appliance or using a system-wide […]

Read More

Who Got Hacked

Who Got Hacked This Week? Feb. 25 Edition

What types of cyberattack were carried out this week, February 25, 2017? Read on to find out.

February 25, 2017 Jonathan Blackwood Leave a Comment

Note: Each week we bring you the latest hacking news on the internet. Read on to find out who and what was hacked this week.   Hackers Use Malware to Spy on Israeli Military Personnel More than 100 = servicemen from the Israeli Defense Force have been targeted with spyware called ViperRAT. The malware was […]

Read More

Who Got Hacked

Who Got Hacked This Week? Feb. 11 Edition

Who and what was hacked this week, February 11, 2017? Read on to find out.

February 11, 2017 Jonathan Blackwood Leave a Comment

Note: Each week we bring you the latest hacking news on the internet. Read on to find out who and what was hacked this week.   Thousands of WordPress Sites Hacked After secretly patching three security flaws over a week ago, WordPress disclosed information about a vulnerability. WordPress worked closely with security companies to install […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 42
  • Page 43
  • Page 44
  • Page 45
  • Page 46
  • Page 47
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.