Featured

Understanding Security Services

From accessing banking services to high regard places, including companies and offices, you will always find a security guard in the area. Apart from...

DDoS Attacks Wane In Q4 Amid Cryptomining Resurgence

The volume of attacks fell 31 percent in the last part of 2020, as Bitcoin values skyrocketed. But there were still several notable trends,...

Fake Whatsapp App May Have Been Built To Spy On iPhone...

What’s happened? A fake version of the WhatsApp messaging app is suspected of being created by an Italian spyware company to snoop upon individuals and...

Understanding The Online Safety And Privacy Challenges Faced By South Asian...

For South Asian women, a major hurdle to their meaningful participation online is their ability to ensure their safety. This post illustrates this challenge...

Parler Finds A Reprieve In Russia—But Not A Solution

The far-right platform still hasn’t found a US-based home. Where it lands could have serious consequences for its users’ privacy...

Secret Backdoor Account Found In Several Zyxel Firewall, VPN Products

Zyxel has released a patch to address a critical vulnerability in its firmware concerning a hardcoded, undocumented secret account that could be abused by...

Maze Ransomware Influenced LockBit’s New Data Leaks Website

The LockBit ransomware gang launched a new data leaks website after sharing a portal with Maze ransomware attackers for a few months...

Lazarus Supply Chain Attack In South Korea

ESET telemetry data recently led our researchers to discover attempts to deploy Lazarus malware via a supply-chain attack in South Korea. In order to...

Supply Chain Attacks Show Why You Should Be Wary Of Third-party...

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk...

Android Spyware Variant Snoops On WhatsApp, Telegram Messages

Researchers say they have uncovered a new Android spyware variant with an updated command-and-control communication strategy and extended surveillance capabilities that snoops on social...

Cisco Moves To Buy Cloud And Container Security Startup

The purchase gives Cisco a foothold into cloud-native application security – a market that analysts expect to nearly double from $34 billion to $68...

Suspended Sentence For Brit Caught In FBI Creepware Sting

John Wood's voyeuristic crimes were uncovered in 2018 as part of a joint investigation by British police and the Federal Bureau of Investigation (FBI)...

Mcafee Raises $740M In Second IPO

McAfee today made its return to the public market after pricing its initial public offering late Wednesday at $20 a share and raising $740...

Coronavirus: North Korea And Russia Hackers ‘Targeting Vaccine’

State-backed hackers from North Korea and Russia have been targeting organisations working on a coronavirus vaccine, Microsoft has said. It said a Russian group...

Best DIY Home Security Systems Of 2020

Keep an eye on your home with one of these do-it-yourself security systems...

Choosing the Right Technology for Your Business

Are you considering starting a business or advancing your business? Well, here’s a secret to focus on, get technology to help you run your...

Facebook Vs. Inauthenticity. CISA And FBI Alerts. DoppelPaymer Implicated In Death....

Facebook has taken down a Chinese disinformation network that sought to influence public opinion in the US and the Philippines; they also took down...

Secure Your Zoom Account With Two-Factor Authentication

Two-factor authentication, however, provides an additional safety net – even if your password falls into the hands of cybercriminals. That’s because 2FA turns logging...

Understanding The Online Safety And Privacy Challenges Faced By South Asian...

For South Asian women, a major hurdle to their meaningful participation online is their ability to ensure their safety. This post illustrates this challenge...

North Korea’s BeagleBoyz Resumes International Attacks Targeting Banks

North Korea’s BeagleBoyz team resumed its efforts to target banks worldwide with fraudulent money transfers and ATM cash outs...

How Facebook And Other Sites Manipulate Your Privacy Choices

IN 2010, THE Electronic Frontier Foundation was fed up with Facebook’s pushy interface. The platform had a way of coercing people into giving up...

Facebook Buries News That Millions Of Instagram Passwords Were Stored In...

Update came as world's attention was turned to attorney general William Barr's statement on Trump revelations...

QSnatch Data-Stealing Malware Infected Over 62,000 QNAP NAS Devices

Cybersecurity agencies in the US and UK yesterday issued a joint advisory about a massive ongoing malware threat infecting Taiwanese company QNAP's network-attached storage...

Fake DNS Security Upgrade Scam Compromises WordPress Websites

In late June, Naked Security received a scam email that pretended to originate from WordPress.com. It leveraged this cover to inform the recipient that...

More Evil: A Deep Look At Evilnum And Its Toolset

ESET research gives a detailed picture of the operations of the Evilnum group and its toolkit deployed in attacks against carefully chosen targets in...

Amazon ‘Thwarts Largest Ever Ddos Cyber-Attack’

Amazon says its online cloud, which provides the infrastructure on which many websites rely, has fended off the largest DDoS attack in history. Distributed...

New Cybersecurity Recommendations For US Government Target Iot, Social Media

The COVID-19 pandemic spurs the Cyberspace Solarium Commission policy initiative to issue a set of four security recommendations for the federal government in the...

Breaking Up With Your Abusive Ex’s Tech

Here are some key privacy protection measures you can take to get bad people out of your digital life...

Utah Tech CEO Jailed for Possessing Thousands of Files Depicting Child...

he 40-year-old one-time CEO of a Utah tech company is serving a custodial sentence after downloading over 13,000 images of child sexual abuse, bestiality,...

Phishing Campaigns Leverage Google Firebase Storage

New phishing campaigns tracked by Trustware deploy schemes that harvest credentials by taking advantage of “the reputation and services” of the Google Cloud’s Firebase...
2,614FansLike
2,964FollowersFollow
560FollowersFollow