Featured

FBI Cleans Web Shells From Hacked Exchange Servers In Rare Active...

The FBI has been deleting backdoors placed by cyberespionage group Hafnium on Microsoft Exchange servers. The court order allowing them to do so signals...

Parler Finds A Reprieve In Russia—But Not A Solution

The far-right platform still hasn’t found a US-based home. Where it lands could have serious consequences for its users’ privacy...

Secret Backdoor Account Found In Several Zyxel Firewall, VPN Products

Zyxel has released a patch to address a critical vulnerability in its firmware concerning a hardcoded, undocumented secret account that could be abused by...

VPNs Begin To Lose Their Relevance, Even As They Remain Difficult...

Virtual private networks have been around for decades, but the past year forced many organizations to expand their use to keep up with growing...

Netflix Introduces Measures To Prevent Password Sharing

Netflix has introduced trial measures to try and prevent the practice of password sharing with multiple households, it has been reported by the BBC...

6 Tips For Limiting Damage From Third-Party Attacks

The ability to protect your organization from third-party attacks will become increasingly critical as attackers try to maximize the effectiveness of their malicious campaigns...

Facebook Data For Over 500M Users Reportedly Leaks Online

Personal information on hundreds of millions of Facebook users, including names, birth dates and phone numbers, has reportedly been posted to a website for...

Personal Security; A Necessary Life Insurance

A man with no security backup is like a man with no life insurance. Anything can happen; besides, he is at risk of being...

Understanding The Online Safety And Privacy Challenges Faced By South Asian...

For South Asian women, a major hurdle to their meaningful participation online is their ability to ensure their safety. This post illustrates this challenge...

Fake Whatsapp App May Have Been Built To Spy On iPhone...

What’s happened? A fake version of the WhatsApp messaging app is suspected of being created by an Italian spyware company to snoop upon individuals and...

DDoS Attacks Wane In Q4 Amid Cryptomining Resurgence

The volume of attacks fell 31 percent in the last part of 2020, as Bitcoin values skyrocketed. But there were still several notable trends,...

Understanding Security Services

From accessing banking services to high regard places, including companies and offices, you will always find a security guard in the area. Apart from...

Lazarus Supply Chain Attack In South Korea

ESET telemetry data recently led our researchers to discover attempts to deploy Lazarus malware via a supply-chain attack in South Korea. In order to...

Supply Chain Attacks Show Why You Should Be Wary Of Third-party...

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk...

Android Spyware Variant Snoops On WhatsApp, Telegram Messages

Researchers say they have uncovered a new Android spyware variant with an updated command-and-control communication strategy and extended surveillance capabilities that snoops on social...

Cisco Moves To Buy Cloud And Container Security Startup

The purchase gives Cisco a foothold into cloud-native application security – a market that analysts expect to nearly double from $34 billion to $68...

Suspended Sentence For Brit Caught In FBI Creepware Sting

John Wood's voyeuristic crimes were uncovered in 2018 as part of a joint investigation by British police and the Federal Bureau of Investigation (FBI)...

Mcafee Raises $740M In Second IPO

McAfee today made its return to the public market after pricing its initial public offering late Wednesday at $20 a share and raising $740...

Coronavirus: North Korea And Russia Hackers ‘Targeting Vaccine’

State-backed hackers from North Korea and Russia have been targeting organisations working on a coronavirus vaccine, Microsoft has said. It said a Russian group...

Best DIY Home Security Systems Of 2020

Keep an eye on your home with one of these do-it-yourself security systems...

Choosing the Right Technology for Your Business

Are you considering starting a business or advancing your business? Well, here’s a secret to focus on, get technology to help you run your...

Facebook Vs. Inauthenticity. CISA And FBI Alerts. DoppelPaymer Implicated In Death....

Facebook has taken down a Chinese disinformation network that sought to influence public opinion in the US and the Philippines; they also took down...

Secure Your Zoom Account With Two-Factor Authentication

Two-factor authentication, however, provides an additional safety net – even if your password falls into the hands of cybercriminals. That’s because 2FA turns logging...

Understanding The Online Safety And Privacy Challenges Faced By South Asian...

For South Asian women, a major hurdle to their meaningful participation online is their ability to ensure their safety. This post illustrates this challenge...

North Korea’s BeagleBoyz Resumes International Attacks Targeting Banks

North Korea’s BeagleBoyz team resumed its efforts to target banks worldwide with fraudulent money transfers and ATM cash outs...

How Facebook And Other Sites Manipulate Your Privacy Choices

IN 2010, THE Electronic Frontier Foundation was fed up with Facebook’s pushy interface. The platform had a way of coercing people into giving up...

Facebook Buries News That Millions Of Instagram Passwords Were Stored In...

Update came as world's attention was turned to attorney general William Barr's statement on Trump revelations...

QSnatch Data-Stealing Malware Infected Over 62,000 QNAP NAS Devices

Cybersecurity agencies in the US and UK yesterday issued a joint advisory about a massive ongoing malware threat infecting Taiwanese company QNAP's network-attached storage...

Fake DNS Security Upgrade Scam Compromises WordPress Websites

In late June, Naked Security received a scam email that pretended to originate from WordPress.com. It leveraged this cover to inform the recipient that...

More Evil: A Deep Look At Evilnum And Its Toolset

ESET research gives a detailed picture of the operations of the Evilnum group and its toolkit deployed in attacks against carefully chosen targets in...
2,599FansLike
2,389FollowersFollow
560FollowersFollow