Featured

Choosing the Right Technology for Your Business

Are you considering starting a business or advancing your business? Well, here’s a secret to focus on, get technology to help you run your...

Coronavirus: North Korea And Russia Hackers ‘Targeting Vaccine’

State-backed hackers from North Korea and Russia have been targeting organisations working on a coronavirus vaccine, Microsoft has said. It said a Russian group...

Supply Chain Attacks Show Why You Should Be Wary Of Third-party...

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk...

Best DIY Home Security Systems Of 2020

Keep an eye on your home with one of these do-it-yourself security systems...

Mcafee Raises $740M In Second IPO

McAfee today made its return to the public market after pricing its initial public offering late Wednesday at $20 a share and raising $740...

Suspended Sentence For Brit Caught In FBI Creepware Sting

John Wood's voyeuristic crimes were uncovered in 2018 as part of a joint investigation by British police and the Federal Bureau of Investigation (FBI)...

Cisco Moves To Buy Cloud And Container Security Startup

The purchase gives Cisco a foothold into cloud-native application security – a market that analysts expect to nearly double from $34 billion to $68...

Android Spyware Variant Snoops On WhatsApp, Telegram Messages

Researchers say they have uncovered a new Android spyware variant with an updated command-and-control communication strategy and extended surveillance capabilities that snoops on social...

Facebook Vs. Inauthenticity. CISA And FBI Alerts. DoppelPaymer Implicated In Death....

Facebook has taken down a Chinese disinformation network that sought to influence public opinion in the US and the Philippines; they also took down...

Secure Your Zoom Account With Two-Factor Authentication

Two-factor authentication, however, provides an additional safety net – even if your password falls into the hands of cybercriminals. That’s because 2FA turns logging...

Understanding The Online Safety And Privacy Challenges Faced By South Asian...

For South Asian women, a major hurdle to their meaningful participation online is their ability to ensure their safety. This post illustrates this challenge...

North Korea’s BeagleBoyz Resumes International Attacks Targeting Banks

North Korea’s BeagleBoyz team resumed its efforts to target banks worldwide with fraudulent money transfers and ATM cash outs...

How Facebook And Other Sites Manipulate Your Privacy Choices

IN 2010, THE Electronic Frontier Foundation was fed up with Facebook’s pushy interface. The platform had a way of coercing people into giving up...

Facebook Buries News That Millions Of Instagram Passwords Were Stored In...

Update came as world's attention was turned to attorney general William Barr's statement on Trump revelations...

QSnatch Data-Stealing Malware Infected Over 62,000 QNAP NAS Devices

Cybersecurity agencies in the US and UK yesterday issued a joint advisory about a massive ongoing malware threat infecting Taiwanese company QNAP's network-attached storage...

Fake DNS Security Upgrade Scam Compromises WordPress Websites

In late June, Naked Security received a scam email that pretended to originate from WordPress.com. It leveraged this cover to inform the recipient that...

More Evil: A Deep Look At Evilnum And Its Toolset

ESET research gives a detailed picture of the operations of the Evilnum group and its toolkit deployed in attacks against carefully chosen targets in...

Amazon ‘Thwarts Largest Ever Ddos Cyber-Attack’

Amazon says its online cloud, which provides the infrastructure on which many websites rely, has fended off the largest DDoS attack in history. Distributed...

New Cybersecurity Recommendations For US Government Target Iot, Social Media

The COVID-19 pandemic spurs the Cyberspace Solarium Commission policy initiative to issue a set of four security recommendations for the federal government in the...

Breaking Up With Your Abusive Ex’s Tech

Here are some key privacy protection measures you can take to get bad people out of your digital life...

Utah Tech CEO Jailed for Possessing Thousands of Files Depicting Child...

he 40-year-old one-time CEO of a Utah tech company is serving a custodial sentence after downloading over 13,000 images of child sexual abuse, bestiality,...

Phishing Campaigns Leverage Google Firebase Storage

New phishing campaigns tracked by Trustware deploy schemes that harvest credentials by taking advantage of “the reputation and services” of the Google Cloud’s Firebase...

RATicate Group Hits Industrial Firms With Revolving Payloads

A new threat group uses NSIS as an installer to target industrial companies with revolving payloads, including LokiBot, FormBook, BetaBot, Agent Tesla and Netwire...

This Sneaky Phishing Technique Is Tricking Employees Into Installing Malware Or...

Security researchers are warning users about the increase in a particular phishing technique that tricks unsuspecting employees into performing malicious activities. This can include...

You Have 4 Days To Submit Your Equifax Data Breach Claim...

You have just a handful of days to file your claim if you're among the 147 million people whose data was exposed in the...

How AI And Cybersecurity Will Intersect In 2020

So much of the discussion about cybersecurity's relationship with artificial intelligence and machine learning (AI/ML) revolves around how AI and ML can improve security...

Aussie P&N Bank Suffers Data Breach

The Australian P&N Bank reported a data breach that exposed detailed and sensitive financial information on an unspecified number of customers. Access was gained...

‘Fleeceware’ Apps Downloaded 600M Times From Google Play

New research shows apps that dupe users into being charged excessively with little reward persist on the Android app store. Google has made a...

How SASE Improves Security Information, Event Management

Earlier this month, secure access service edge (SASE) vendor Cato announced a way for mid-size companies to deploy SIEM at a fraction of the...

Podcast: Meeting The Security Threats Of 2020

Bret Hartman has been in cybersecurity since he was a young Air Force lieutenant. Followed by stints at the NSA, IBM, and EMC. Along...
2,627FansLike
3,252FollowersFollow
560FollowersFollow