Blog 2017-11-20T19:18:12+00:00



4 tips for making data cleanup easier and more efficient

May 18th, 2018|0 Comments   Dirty data costs the US economy up to $3.1 trillion a year and organizations have been trying to deal with it by using methods like deduplication, normalization, or even removing or correcting broken or incomplete [...]

Seven out of ten see criminal hacking as big risk to health, safety, prosperity

May 16th, 2018|0 Comments

Do criminals hacking into computer systems pose a risk to your health, safety, or prosperity? If you ask US adults this question, the answer is likely to be a resounding yes! Last month we put [...]

Critical PGP vulnerability could reveal text of your encrypted business emails

May 14th, 2018|0 Comments

The vulnerability, called EFAIL, is exploitable against encrypted email, including previously transmitted mail, according to researchers. By James Sanders  | May 14, 2018, 5:45 AM PST   Critical unpatched vulnerabilities in widely-used email encryption tools PGP [...]

A well-trained staff may be your best defense against IoT cyberattacks

May 9th, 2018|0 Comments

Protecting all your IoT devices from criminals requires more than mere technology. Every employee must be security aware and trained on what do to when attacks occur. According to Symantec's 2018 Internet Security Threat Report (ISTR), [...]

To save thousands on GDPR compliance, some companies are blocking all EU users

May 7th, 2018|0 Comments

To ensure compliance with the EU's upcoming General Data Protection Regulation (GDPR), companies such as GDPR Shield are offering tools for blocking EU users altogether. By James Sanders  | May 7, 2018, 6:50 AM PST With the [...]

WiFi or Ethernet: Which is faster and which is safer?

May 4th, 2018|0 Comments

There is a lot of debate about WiFi speeds and whether they can offer higher potential speeds than a cable connection, but in practice Ethernet connections turn out to be not only faster but also [...]

Top 5: Things to know about fileless attacks

May 2nd, 2018|0 Comments   Securing your company does mean stopping malware. But in the ever evolving security war, bad actors are turning to what are called fileless attacks that don't require a payload or tricking someone into [...]

RSA 2018: Behind the lines

April 30th, 2018|0 Comments

More than 42,000 people attended last week’s RSA Conference in San Francisco. If you were not in attendance, hopefully you saw the three reports filed by my colleague, Cameron Camp (Untangling the enterprise security mess, Hacking [...]

How to help employees realize their responsibility in keeping a company safe from data breaches

April 26th, 2018|0 Comments TechRepublic's Dan Patterson spoke with Christy Wyatt, CEO of Dtex Systems, on the cavalier attitude many employees have regarding data breaches, despite most being aware of the inevitable dangers. Dan Patterson: A new report by [...]

Beware ad slingers thinly disguised as security apps

April 23rd, 2018|0 Comments

ESET researchers have analyzed a newly discovered set of apps on Google Play, Google's official Android app store, that pose as security applications. Instead of security, all they provide is unwanted ads and ineffective pseudo-security. [...]

Protect sensitive data with these five free encryption apps

April 20th, 2018|0 Comments

Protecting customers' personal data is vitally important to the future success of every organization. Encrypting that data with one of these apps is a good place to start. Numerous high-profile events in 2017 and [...]

IT leader’s guide to cyberattack recovery

March 21st, 2018|0 Comments

Cybersecurity prevention efforts shouldn’t overshadow your ability to respond and recover in the event of an attack. This ebook offers advice from security experts on how to recover from a cyberattack with the least amount [...]

How companies can monetize big data with IoT data control

March 14th, 2018|0 Comments

The oil and gas industry, auto manufacturers and more can maximize the value of IoT deployments with IoT data control. A Cisco exec explains how to manage data control and why it's necessary. IoT [...]

Salesforce launches conversational queries with Einstein Analytics

March 12th, 2018|0 Comments

The new capability allows business users to type phrases related to their data and instantly view answers in automatically configured charts. Salesforce's new conversational queries will allow business users to 'have a conversation with [...]

Intel’s new Optane 800P SSD brings super fast storage at a hefty price

March 9th, 2018|0 Comments

The new Intel Optane 800P is a next-gen drive that's faster than the typical SSD, but that performance boost comes at a cost. Intel has announced a new Optane 800P SSD, which uses Intel's [...]

New vulnerability in Exim software allows hackers to gain control of your mail server

March 7th, 2018|0 Comments

The popular mail server software has an off-by-one buffer overflow that can be exploited to run arbitrary code. A critical vulnerability in Exim allows attackers to remotely run arbitrary code without authentication. The vulnerability [...]

How to start analyzing the security of your IoT devices

March 5th, 2018|0 Comments

Nowadays, a lot of attacks take place by tricking the user in some way, such as to open a file, click on a malicious link, or enter their personal data into a fake website. But [...]

GDPR: Regulatory compliance is just the beginning

March 2nd, 2018|0 Comments

Joel Benavides, managing director of global legal services at Box, explains the policies enterprise companies can anticipate with cloud data management after the GDPR. We have just a few months until the GDPR hits. [...]

How to protect Macs from malware threats

February 28th, 2018|0 Comments

Read tips on how to secure Macs from malware, including ransomware, phishing, rootkits, viruses, and more. As malware threats increase in number and frequency, the next big attack could be looming just beyond the [...]

Six tips to help you avoid targeted marketing

February 26th, 2018|0 Comments

Do you ever get that feeling that advertisers are stalking your every move? At this point, most of us can recite a story from our own personal experience or that of a close friend or [...]

Series of critical bugs in NPM are destroying server configurations

February 23rd, 2018|0 Comments

A new version of NPM causes file permissions to be broken under certain circumstances, breaking other applications in the process. A combination of bugs and communication failures from NPM developers has resulted in an outbreak [...]

43% of all online login attempts are made by hackers trying to break into your account

February 22nd, 2018|0 Comments

Content delivery network Akamai says nearly half of all online login attempts are performed by cybercriminals trying to break into accounts containing sensitive user data. A report from Akamai reveals that 43% of all [...]

Concerns about data breaches hitting all-time high

February 16th, 2018|0 Comments

Organizations from various industries across the globe are increasingly hip to the magnitude of the problem posed by data breaches, with 44% of them feeling “very” or “extremely” vulnerable to data threats, according to some [...]

Patch now! Microsoft fixes over 50 serious security flaws

February 14th, 2018|0 Comments

his week saw the second Tuesday of the month, and everyone who is responsible for protecting Windows computers knows what that means: another bundle of security patches have been releasedby Microsoft. This month’s “Patch Tuesday” included [...]

How businesses can keep their employees safe online

February 12th, 2018|0 Comments

From social media to online banking to email, Secure Anchor CEO Eric Cole explains how employee web activity can compromise your company's network. Unfortunately, humans can be a significant threat vector. TechRepublic spoke with [...]

Hackers are now attacking Cisco ASA VPN bug

February 9th, 2018|0 Comments

Cisco researchers are now aware of attempted attacks leveraging a vulnerability in its Adaptive Security Appliance. A major vulnerability affecting Cisco's Adaptive Security Appliance is now under attack by hackers, according to Cisco. Companies [...]

How to encrypt files on a Ubuntu server with Tomb

February 8th, 2018|0 Comments

Looking for an easy to use, command line encryption tool for Linux? Jack Wallen walks you through the process of creating encrypted vaults with Tomb. Data security: Two words that cause more and more IT [...]

Why it’s important to avoid FUD fatigue and threat rigidity when making security decisions

February 5th, 2018|0 Comments

Crying wolf to elicit a certain response is poor cybersecurity, contributing to a phenomenon called threat rigidity. Here's advice on successfully guiding your organization through a security incident. Relying on Fear, Uncertainty, and Doubt [...]

IT industry revenue will grow 5% this year, driven by cloud, AI, IoT

February 2nd, 2018|0 Comments

The IT sector is poised to grow in 2018, amid higher expectations for business value, security, transparency, and equal access to opportunity. IT sector revenue is projected to grow 5% in 2018. — CompTIA, [...]

Data Privacy vs. Data Protection: Reflecting on Privacy Day and GDPR

January 31st, 2018|0 Comments

As we approach Data Privacy Day 2018, consider this question: how much risk do you believe theft or exposure of private data poses to human health, safety, or prosperity? ESET security researchers posed that exact [...]

Here are the ‘most clicked’ phishing email templates that trick victims

January 29th, 2018|0 Comments

Wombat's state of phishing report shows that attack rates remain steady, but there is some good news: User Click rates have dropped. The most successful phishing attacks are now consumer focused, instead of business [...]

How the private sector and US government can work together to defend against cyberattacks

January 26th, 2018|0 Comments

Sharing information about cyberthreats that face both private corporations and the government can benefit both institutions, according to attorney and former CIA case officer Jack Rice. TechRepublic's Dan Patterson spoke to attorney and former [...]

Android Security Bulletin January 2018: What you need to know

January 24th, 2018|0 Comments

The first month of the year was somewhat kind on Android security. Here are the highlights from the January Android Security Bulletin. A scant five vulnerabilities were marked as Critical in the latest Security Bulletin—continuing [...]

Cybersecurity incidents top the 2018 Allianz Risk Barometer as second largest concern

January 22nd, 2018|0 Comments

Data breaches, malware, and ransomware attacks are now a primary concern for SMBs and enterprise companies, says Allianz cybersecurity chief Jenny Soubra. Cybersecurity incidents now rank as number two on the Allianz Risk Barometer, a [...]

Are mobile devices insecure by nature?

January 19th, 2018|0 Comments

It is no easy feat to recall going through life without the vast variety of mobile devices that are now part of our day-to-day. What is more, it is downright impossible to imagine a future [...]

Report: Only 40% of data stored in cloud secured with encryption, key management

January 17th, 2018|0 Comments

Organizations globally lack clear policies around securing data in the cloud, according to Gemalto and the Ponemon Institute. Only 40% of the data stored in the cloud is secured with encryption and key management [...]

How to make stealing online credentials more difficult for cybercriminals

January 15th, 2018|0 Comments

Victims of phishing are 400 times more likely to be successfully hijacked compared to a random Google user, according to researchers. Find out the most effective ways to mitigate credential [...]

Encrypting communication: Why it’s critical to do it well

January 10th, 2018|0 Comments

Encryption is essential for securing data, either in transit or stored on devices. It can provide piece of mind that communications will not be intercepted and that sensitive information stored on devices can't be exfiltrated [...]

Don’t forget to go the ‘last mile’ on cybersecurity initiatives

January 10th, 2018|0 Comments

Cybersecurity pros, resolve to always go the last mile when it comes to information security. Here are questions that can help with this crucial part of the process. For more than a decadeI have [...]

Why your next contactless credit card might have a fingerprint scanner built-in

January 9th, 2018|0 Comments

Contactless credit cards that utilize biometrics, like one recently launched by Gemalto, may help prevent identity theft. Building a slide deck, pitch, or presentation? Here are the big takeaways: Gemalto launched a contactless credit [...]

Why cybersecurity in 2018 will be an AI vs. AI slugfest

January 9th, 2018|0 Comments

Cybercriminals will soon rely on machine learning and other AI-based attacks to hammer corporate systems and imitate human behavior, says IBM Security's Caleb Barlow. In 2018, we will see a rise in artificial intelligence-powered [...]

Vocal disguises and impersonations may fool voice recognition authentication

January 2nd, 2018|0 Comments

Research indicates that impersonating a voice can fool voice recognition authentication systems. Multimodal biometric authentication might be a better security option. Pundits predict that biometrics will eventually replace passwords as the preferred method of authenticating users. [...]

Software updates for workstations and mobile devices: How to stay safe and sane

December 29th, 2017|0 Comments

To maintain security for your organization, it's essential to have a plan in place that ensures all updates are applied to workstations and mobile devices. With cybercrime on the rise, maintaining a regular schedule [...]

Top five emerging cybersecurity trends for 2018

December 27th, 2017|0 Comments

Netwrix sums up the top cybersecurity trends that will define the way organizations develop their IT strategies in the coming year. Netwrix Corporation, provider of a visibility platform for user behavior analysis and risk mitigation [...]

How to add a layer of privacy to your conversations using Tor Messenger

December 26th, 2017|0 Comments

If you need to add a layer of anonymity and security to the likes of Google Hangouts and Twitter, Tor Messenger has you covered. Jack Wallen shows you how to make use of this tool. [...]

The 20 worst passwords of 2017: Did yours make the list?

December 22nd, 2017|0 Comments

Despite all of the year's major hacks, people still can't seem to let passwords like 'admin' and '123456' go. For the fourth consecutive year, "123456" and "password" topped the list of leaked passwords. —SplashData, [...]

Australia’s open data approach lands in a security and privacy minefield

December 20th, 2017|0 Comments

Australia is charging headlong into a privacy disaster as government open data initiatives come online without considering how to properly implement privacy safeguards and data anonymity. Learning about data security and privacy the hard [...]

Warning: Cyber breaches more likely over holiday break

December 18th, 2017|0 Comments

Some 28% of employees have never received cybersecurity training. Here's how to help them stay safe while on holiday break. Building a slide deck, pitch, or presentation? Here are the big takeaways: 24% of [...]

The evolution of ransomware: Get ready for more advanced social engineering tactics

December 15th, 2017|0 Comments

Prepare your company for more sophisticated, complex, and devastating ransomware attacks in 2018, says Avecto COO Andrew Avanessian. Ransomware became a massive nuisance for enterprises, SMBs, and consumers in 2017—and that threat is not going [...]

99% of office workers threaten their company’s cybersecurity

December 13th, 2017|0 Comments

Minor actions, like reusing passwords, suggest workers may prioritize convenience over enterprise security, a new report said. Virtually all office workers—99%—admit to making at least one action that could threaten a company's cybersecurity, a new [...]

Five programming languages with hidden flaws vulnerable to hackers

December 11th, 2017|0 Comments

Even if developers go above and beyond to avoid flaws that can be exploited by hackers, attackers can often still take advantage of bugs in the design of the underlying programming language. Writing bug-free [...]

20 must-read TechRepublic downloads about IT jobs, Office tips, security basics, and more

December 8th, 2017|0 Comments

Check out these TechRepublic PDF downloads to read investigative reports, in-depth special features, productivity tips, and career advice. In addition to keeping up with the day-to-day news that business and technology leaders need to [...]

You shouldn’t change domain controller network settings, but here’s how to do it if you must

December 8th, 2017|0 Comments

Changing network settings on a domain controller can be a risky ordeal. It's best avoided, but if you must do it make sure to follow these tips. Active Directory domain controllers (DCs) are probably [...]

Report: 71% of consumers fear AI will infringe on their privacy

December 6th, 2017|0 Comments

Despite optimism from tech leaders, consumers may not be as excited for AI in their lives, a new study found. Nearly three-fourths of people say they don't want companies to use artificial intelligence (AI) [...]

Google’s new app privacy standards mean big changes for developers

December 4th, 2017|0 Comments

Android apps will have to make explicit what customer and device data is being used, for what purpose, and when. If devs don't comply, the apps will be flagged with warnings. Google has announced [...]

Girl Scouts to train next generation of cybersecurity, AI, and robotics professionals

December 4th, 2017|0 Comments

Girl Scouts of the USA and Raytheon are partnering to create a national computer science program for middle and high school girls, in efforts to diversify the STEM workforce. The Girls Scouts are continuing [...]

How IBM’s Quad9 service protects users from accessing malicious websites

November 29th, 2017|0 Comments

The company says the new DNS service will block visits to harmful sites while protecting users' privacy. IBM recently partnered with Packet Clearing House (PCH) and the Global Cyber Alliance (GCA) to create Quad9, [...]

AWS to increase enterprise security with private endpoint option

November 29th, 2017|0 Comments

The new AWS PrivateLink feature lets SaaS developers build private endpoints to access the service. Amazon Web Services (AWS) will let Software as a Service (SaaS) application developers offer private endpoints, the company announced [...]

Firefox Breach Alerts will warn users if they visit a hacked site

November 27th, 2017|0 Comments

A new prototype extension for Firefox will alert an internet user if the website they land on has been breached. A new prototype extension for Mozilla Firefox aims to alert users if their personal [...]

Android users: Google is collecting your location data even if location services are off

November 21st, 2017|0 Comments

As long as you're accessing the internet on an Android device, Google can figure out where you are, a new Quartz investigation found. Android phones are collecting users' location information, even when location services [...]

The future of cyberwar: ​Weaponised ransomware, IoT attacks and a new arms race

November 15th, 2017|0 Comments

Now that cyberwarfare is out of the shadows, here's a taste of what is coming next. After at least a dozen years in the shadows, cyberwarfare is gradually emerging into daylight. While cyber weapons were mostly [...]

Cybersecurity predictions for 2018: it’s going to be “a lot more of the same”

November 13th, 2017|0 Comments

Forcepoint's Richard Ford predicts the types of cyberattacks that might plague businesses in the upcoming year. When it comes to defending cyberattacks, "this has been a tough year, and 2018 is going to be [...]

Don’t click that! How to spot an invoice impersonation attack that pretends to be from a coworker

November 10th, 2017|0 Comments

Invoice impersonation attacks are on the rise, attempting to download malware that steals victims' credentials. Finance workers are seeing a wave of phishing attacks that send victims a link to a fake invoice that [...]

Report: 77% of companies say IoT has created ‘significant’ security gaps

November 8th, 2017|0 Comments

The majority of companies cannot identify all of the Internet of Things devices connected to their network, according to a new ForeScout report. While the Internet of Things (IoT) has allowed businesses to become [...]

5 ways to build your company’s defense against a data breach before it happens

November 6th, 2017|0 Comments

Data breaches can be chaotic and stressful episodes. Learn the most effective actions you can take to help plan for these turbulent events. Suffering a data breach can be catastrophic for a company — [...]

Why UN cybercrime chief calls attacks an economic issue

November 3rd, 2017|0 Comments

Companies don't just lose valuable information after experiencing a cyberattack, they lose the public's trust as well. "This impacts people's lives," says the UN's Neil Walsh. There isn't a day that goes by where [...]

Insider secrets of a white hat hacker on security that actually works

November 1st, 2017|0 Comments

White hat hacker Marc Rogers knows how to take down your network, or secure it. Here's why businesses and IT should pay attention. We've never had a greater need for security, and it's never [...]

3 simple Ways To Protect Your Data

November 1st, 2017|0 Comments

As passwords become easier to hack, IBM Security's Limor Kessem explains three ways your enterprise can protect itself. Passwords are increasingly becoming easier to hack, meaning that companies must take new actions to protect [...]

Microsoft’s October Patch Batch Fixes 62 Flaws

October 30th, 2017|0 Comments

Microsoft on Tuesday released software updates to fix at least 62 security vulnerabilities in Windows, Office and other software. Two of those flaws were detailed publicly before yesterday’s patches were released, and one of them is already being exploited [...]

Shark Tank’s Robert Herjavec: Cybersecurity at work is everyone’s responsibility

October 27th, 2017|0 Comments

The investor and founder of cybersecurity firm Herjavec Group spoke with TechRepublic about the biggest threats facing businesses, and how all employees can get involved in security. Despite the critical nature of cybersecurity, it [...]

Do These 3 Things To Keep Yourself And Your Company Cyber-Secure

October 25th, 2017|0 Comments Jenny Soubra, Head of Cybersecurity for Allianz, explains the steps small and middle market businesses can take to ensure they are prepared to mitigate data breaches, ransomware attacks, and infrastru... Limor Kessem, Executive [...]

Nearly Undetectable Microsoft Office Exploit Installs Malware Without An Email Attachment

October 25th, 2017|0 Comments

Security firm Sophos uncovered a zero day exploit that targets a 24-year-old data exchange protocol, and it can be used to silently attack machines with very little means of detection. A newly discovered Microsoft [...]

Malware Campaign Targets Security Researchers With Bogus Cyber Conference Document

October 23rd, 2017|0 Comments

Hackers Group 74 are using fake messages from the Cyber Conflict US conference to infect cybersecurity experts with malware, according to a new report from Cisco Talos.   Cybersecurity workers, beware: A new malicious [...]

Top Tips To Keep Cybercriminals Out Of Your Home

October 23rd, 2017|0 Comments

Your home is not just bricks and mortar anymore – it is becoming a connected web of technology that needs to be protected. Every new smart  ‘thing’ we bring into our homes – be it [...]

How To Install And Use Uncomplicated Firewall In Ubuntu

October 20th, 2017|0 Comments

The security of your desktop is crucial. To that end, you should know how to manage the firewall. Here's how easy that can be on Linux with Uncomplicated Firewall. It has long been said that [...]

Survey Shows Most Workers Misunderstand Cybersecurity: How To Improve Awareness In Your Organization

October 20th, 2017|0 Comments

A 2017 report from Wombat Security revealed that most US workers don't understand concepts like ransomware and Wi-Fi security. These tips will help you improve user cybersecurity awareness. A User Risk Report released by Wombat Security [...]

5 Steps Leaders Can Take To Improve Cybersecurity In Their Organization

October 18th, 2017|0 Comments

Nearly half of companies do not have an overall information security strategy, according to a new report from PwC. Here's how leaders can step up cybersecurity measures. Despite the rise of ransomware and other [...]

How To Keep Your WordPress Site Secure

October 18th, 2017|0 Comments

SiteLock president Neill Feather explains simple ways the 74 million websites powered by WordPress can remain secure. Open source software like WordPress has a reputation for beingless secure than closed source, and that's not [...]

Google Chrome Adds 3 New Antivirus Protections, Improving Security For Windows Users

October 18th, 2017|0 Comments

The new settings, introduced in Chrome for Windows, protect users from hijacked settings, unwanted software, and changes that could impact the user experience. Chrome for Windows users have three new antivirus features for safer [...]

How To Protect Your Windows 10 PC From Ransomware With The Fall Creators Update

October 18th, 2017|0 Comments

The Windows 10 Fall Creators Update includes an amazing new feature: Folder protection against ransomware. Here's how to activate this essential security feature. 3 must-have security features in the Windows 10 Fall Creators Update [...]

Businesses Should Update Adobe Flash Immediately To Avoid This Exploit

October 18th, 2017|0 Comments

Kaspersky Lab recently identified an Adobe Flash zero day exploit that has already been used in an attack in the wild. Businesses that use Adobe Flash should update the program in order to avoid [...]

DHS Orders Federal Agencies To Bolster Cybersecurity With HTTPS, Email Authentication

October 18th, 2017|0 Comments

The US Department of Homeland Security will require federal agencies to use web and email encryption practices to enhance their security posture. On Monday, the US Department of Homeland Security announced a new requirement for federal [...]

KRACK WPA2 Protocol Wi-Fi Attack: How It Works And Who’s At Risk

October 18th, 2017|0 Comments

A vulnerability in the WPA2 protocol used in secured Wi-Fi networks allows hackers to force devices to install arbitrary encryption keys. Here are the details of how the attack works. A vulnerability in the [...]

Sweeping Wi-Fi Security Flaw Has Left Nearly Every Connected Device At Risk

October 18th, 2017|0 Comments

A WPA2 security flaw known as KRACK breaks down the common security protocol, leaving nearly every Wi-Fi-connected device at risk for data theft or hacking. Nearly all modern, protected Wi-Fi networks and the devices [...]

WPA2 security issues pose serious Wi-Fi safety questions

October 16th, 2017|0 Comments

The WPA2 encryption scheme has been broken leaving Wi-Fi connections open for would-be attackers who could use an attack to read information that was previously believed to have been secure because it was encrypted. ‘KRACK’ [...]

How To Protect Your Systems From Newly-Discovered Dnsmasq Vulnerabilities

October 13th, 2017|0 Comments

Google recently discovered seven vulnerabilities in DNS software Dnsmasq. Here's how to protect your company's operating systems, IoT, and networking devices. Google recently announced that they have discovered seven new vulnerabilities in the Domain Name System [...]

Why These Cybersecurity Researchers Are Automating Vulnerability Assessments

October 13th, 2017|0 Comments

System complexity is preventing humans alone from finding vulnerabilities, so researchers in the UK and at CMU are working to automate an online cybersecurity system support service to help analysts. There is an axiom [...]

US AG rips Silicon Valley Tech Firms, Says Encryption Makes Crime Easier To Hide

October 11th, 2017|0 Comments

The US Deputy Attorney General Rod Rosenstein recently gave a speech criticizing Silicon Valley tech companies for not working with the US government on encryption. At a US Naval Academy speech on Tuesday, deputy [...]

60% of Americans Want To Live In A Smart City

October 11th, 2017|0 Comments

A CompTIA report shows that 6 in 10 US citizens are interested in living in a smart city, despite concerns about cybersecurity and budgetary constraints. The lure of living in a technologically advanced community [...]

Here’s Google’s Biggest Secret To Not Failing At Security

October 9th, 2017|0 Comments

Security is broken for most enterprises. However, Google shows a better way. Can we all agree that securing the perimeter of an enterprise's IT assets—through firewalls and such—doesn't work and needs a reboot? In [...]

It’s Time That Companies Became More Cyber-Resilient

October 6th, 2017|0 Comments

This year, we have seen some of the most high-profile victims of cybercrime across the world, including the NHS in the UK, and the attack on Equifax that impacted millions of people in several countries. The damage has not [...]

93% Of Companies Have Password Rules, But It May Not Protect Them From Data Breaches

October 4th, 2017|0 Comments

Only half of companies require employee passwords to be changed quarterly, according to a new survey from OneLogin. Weak password policies may be putting your organization at risk for data breaches, according to a [...]

Passwords As We Know Them Are Dying, Here’s What Will Take Their Place

October 4th, 2017|0 Comments

Weak passwords offer many hackers an entry point into enterprises. Here's what the future of security will look like. As employees remain the no. 1 cause of company data breaches, it's key for security leaders to [...]

63% of SMBs Increased Security Spending, But More Than Half Still Experienced Breaches

October 2nd, 2017|0 Comments

Ransomware, phishing, and data breaches top IT security managers' list of concerns this year, according to a new report from Cyren and Osterman Research. ] SMB security spending is rising, but confidence in the ability [...]

How To Install Sophos Antivirus On A Linux Server

September 29th, 2017|0 Comments

If you have a Linux server that serves up files to users on your network, you might need a bit of extra protection. Here's how to install and configure Sophos AV on your Linux server. [...]

10 Of The Most Dangerous Malware Threats On The Internet Today

September 29th, 2017|0 Comments

​Not every malware threat makes the news It isn't often that an outbreak like WannaCry hits the tech world, and when it does there's plenty of attention devoted to killing it. High profile malware doesn't [...]

7 Windows 10 Security Features That Could Help Prevent Cyberattacks Against Your Business

September 29th, 2017|0 Comments

With ransomware and spyware on the rise, enterprises need to stay vigilant to protect data from attackers. Here are some native Windows 10 security features that can help. As the cybersecurity threat landscape expands, [...]

5 Critical IT Security Questions Enterprises Need To Answer Now

September 27th, 2017|0 Comments

At Microsoft Envision, Microsoft's president and chief legal officer Brad Smith shared some tips for how companies can gut check their own security strategy. Companies must address cybersecurity, or else "sentence ourselves to a [...]

Nearly 50% Of Organizations Willing To Pay Extra For Security Guarantee From Cloud Vendors

September 25th, 2017|0 Comments

Despite moving to the cloud for cost savings, most companies are willing to pay extra for certain improvements to their service, a 451 Research report found. Even though many businesses move to the cloud [...]

Report: 99% of Ransomware Targets Microsoft Products

September 22nd, 2017|0 Comments

A new report from Carbon Black analyzed 1,000 ransomware samples to learn how attackers are using it and how threats are evolving. The explosive growth of ransomware is bad news for Windows users. Some [...]

Cheat Sheet: How To Become A Cybersecurity Pro

September 22nd, 2017|0 Comments

If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the field. As cybercriminals [...]

Using Malware And Infrared Light, Hackers Can Turn A Security Camera Into A Business Spy

September 20th, 2017|0 Comments

The method, identified by researchers at Ben-Gurion University of the Negev, can be used to infiltrate data or perform malicious attacks. Security researchers at Ben-Gurion University of the Negev (BGU) were able to use [...]

Infographic: Who Hackers Target During A Cyberattack

September 18th, 2017|0 Comments

A recently-published infographic from CBTS breaks down the different types of cyberattacks and how your company can stay protect itself. Passwords like '12345' and 'password' aren't going to cut it anymore. Hackers target everyone, including [...]

How To Design A Network That Meets All Of Your Users’ Needs

September 13th, 2017|0 Comments

At the VMworld 2017 conference, Moffitt Cancer Center CTO Tom Hull talked about how the hospital designed a network that met its users different needs. http://www.techrepublic.com When designing a network, organizations must cater to users' [...]

Equifax Breach: 5 Defensive Steps To Take Now

September 11th, 2017|0 Comments

As you may have heard from the copious news coverage (including our own), the credit monitoring bureau Equifax, was hit with a security breach which has given thieves access to the data of 143 million [...]

New Report Unveils Top 3 Cybersecurity Threats Facing Business Data

September 8th, 2017|0 Comments

For organizations securing sensitive data, ransomware, insider vulnerabilities, and denial of service attacks are their most-feared threats, according to a new report from the SANS and Infoblox. http://www.techrepublic.com Ransomware, insider threats, and denial of service [...]

Disruptive Cyberattacks Could Hit Energy Infrastructure in US, Europe

September 6th, 2017|0 Comments

A report from Symantec has identified the re-emergence of a hacking group called Dragonfly, which seems to be targeting the energy sector. http://www.techrepublic.com A new "wave of cyberattacks" could be poised to hit the energy [...]

10 Tips For Reducing Insider Security Threats

September 5th, 2017|0 Comments

Insider threats can pose greater risks to company data than those associated with external attacks. Here are some techniques to help you spot and mitigate them as quickly as possible. A report recently released by the [...]

How One Marketing Company Used A Cloud Solution To Address Project-Related Security Risks

September 1st, 2017|0 Comments

Keeping company data secure can get tricky when collaborating with remote employees and contractors. Here's how AdRoll, a marketing platform provider, addressed that issue using a cloud-based service. http://www.techrepublic.com Security risks are not new in [...]

New ESET Research Uncovers Gazer, The Stealthy Backdoor That Spies On Embassies

August 30th, 2017|0 Comments

Security researchers at ESET have released new research today into the activities of the notorious Turla cyberespionage group, and specifically a previously undocumented backdoor that has been used to spy on consulates and embassies worldwide. ESET’s research [...]

VMware AppDefense automates security for apps and data in virtual environments

August 28th, 2017|0 Comments

The solution, two years in the making, relies on intent-based security to protect applications running on virtualized or cloud environments. By Conner Forrest | August 28, 2017, 5:00 AM PST 5 Things To Know About CLOUD Security A [...]

10 browser extensions to keep you safe on the web

August 26th, 2017|0 Comments

You can never be too careful It seems every time you hit F5 there's a new story about a massive corporate hack, a new ransomware outbreak, or the spread of dangerous new malware. Unfortunately, you [...]

Hackers can control damaged phones using replacement screens

August 25th, 2017|0 Comments

Replacement screens for cracked smartphones bought from third party vendors could leave you vulnerable to hackers, a new study has revealed. The research, carried out by Israel’s Ben-Gurion University of the Negev, has shown how hackers [...]

What are the risks of allowing people to use their smartphone at the bank?

August 23rd, 2017|0 Comments

From time to time, our readers raise questions or issues related to topics that concern, or simply interest them. One such issue was brought up recently by a Twitter user, who asked us: “Do you [...]

PlayStation Social Media Accounts Briefly Hacked

August 21st, 2017|0 Comments

Sony became the latest entertainment company to suffer at the fingertips of hackers after their PlayStation social media channels were temporarily hacked on Sunday evening. A group called OurMine claimed credit for the compromise that targeted the [...]

Rogers Cup ‘Tech and Tennis Day’ cybersecurity panel

August 18th, 2017|0 Comments

While you might not think tennis and cybersecurity have much in common, both can be unpredictable and therefore require you to keep your eye on the ball. But unlike a tennis match, cybersecurity is no [...]

Buying encryption? Five good questions to ask before you do

August 17th, 2017|0 Comments

General Data Protection Regulation (GDPR) together with the growing number of data breaches are the most pressing reasons why small and medium businesses are implementing data protection technologies – including encryption. However, with limited time and the market [...]

Google pays $10,000 for student’s bug

August 16th, 2017|0 Comments

Google has rewarded a Uruguayan student with $10,000 after he exposed a security flaw that could allow hackers to access sensitive data. Ezequiel Pereira discovered the vulnerability in Google’s App Engine server after changing the [...]

Gmail now warns iOS users about suspicious links, in fight against phishing threats

August 14th, 2017|0 Comments

Stop! Should you really be clicking on that link you just received in your email? Despite all the headlines about zero-day threats and state-sponsored attacks, the rather less dramatic truth is that the majority of [...]

Avoid getting lost in encryption with these easy steps

August 10th, 2017|0 Comments

Encryption can be the answer to many data security issues faced by small and medium businesses. Not only can it protect sensitive information from unauthorized use and minimize the risks arising from data breaches, implementing this technology [...]

Flash Player is Dead, Long Live Flash Player!

August 7th, 2017|0 Comments

Adobe last week detailed plans to retire its Flash Player software, a cross-platform browser plugin so powerful and so packed with security holes that it has become the favorite target of malware developers. To help eradicate this ubiquitous [...]

Why you should view torrents as a threat

August 2nd, 2017|0 Comments

Despite their popularity among users, torrents are very risky “business”. Apart from the obvious legal trouble you could face for violating the copyright of musicians, filmmakers or software developers, there are security issues linked to [...]

Stantinko: A massive adware campaign operating covertly since 2012

July 24th, 2017|0 Comments

Overview Since the beginning of 2017, ESET researchers have been conducting an investigation into a complex threat mainly targeting Russia and Ukraine. Standing out because of its prevalence and its sophistication, Stantinko turned out to [...]

A major cyberattack could cost the global economy $53 billion

July 18th, 2017|0 Comments

Lloyd’s of London has reported that a serious cyberattack could cost the global economy as much as a devastating natural disaster. According to the Guardian, average losses from a crippling cyberattack are estimated to be around $53 billion. [...]

Why Windows Phone users are now a serious security risk to their employers

July 13th, 2017|0 Comments

Windows Phone is dead. On July 11, Microsoft ended support for the Windows Phone 8.1, effectively killing off the Windows Phone brand. The Windows 10 Phone is still around, but the company hasn't gone out of [...]

Self-Service Food Kiosk Vendor Avanti Hacked

July 10th, 2017|0 Comments

Avanti Markets, a company whose self-service payment kiosks sit beside shelves of snacks and drinks in thousands of corporate breakrooms across America, has suffered of breach of its internal networks in which hackers were able to [...]

Analysis of TeleBots’ cunning backdoor

July 5th, 2017|0 Comments

On the 27th of June 2017, a new cyberattack hit many computer systems in Ukraine, as well as in other countries. That attack was spearheaded by the malware ESET products detect as Diskcoder.C(aka ExPetr, PetrWrap, Petya, or NotPetya). This [...]

Two-factor authentication: An underutilized security measure in businesses

July 3rd, 2017|0 Comments

Whenever a business considers the security measures it can implement, three options always crop up: antivirus on endpoints and servers to detect and eliminate as many threats as possible;  backups to ensure that any data lost in an incident [...]

New WannaCryptor-like ransomware attack hits globally: all you need to know

June 28th, 2017|0 Comments

Update (June 27 – 23.34 CEST): Shutting down the computer and not booting again could prevent the disk encryption, though several files can be already encrypted after the MBR is replaced and further infection through [...]

How to remove geolocation information from a photo in Google Photos

June 26th, 2017|0 Comments

It's vacation season for many people. Time to shrug off the mantle of business and IT and take a dip in the ocean, climb a mountain, visit a museum, or whatever your penchant. While on [...]

Got Robocalled? Don’t Get Mad; Get Busy.

June 26th, 2017|0 Comments

Several times a week my cell phone receives the telephonic equivalent of spam: A robocall. On each occasion the call seems to come from a local number, but when I answer there is that telltale pause [...]

Girl Scouts USA to offer badges on cybersecurity

June 20th, 2017|0 Comments

The Girls Scouts USA (GSUSA) is set to offer badges on cybersecurity, amid growing concerns that women are still being deprived of opportunities to enter the industry. Citing the Computing Technology Industry Association, it said [...]

Seven years after Stuxnet: Industrial systems security once again in the spotlight

June 16th, 2017|0 Comments

June seems to be historically rich in important events relating to the security of industrial systems. For example, June 17th, 2010, may be considered the day that Stuxnet was discovered, the malware behind the very [...]


June 15th, 2017|0 Comments

The unusual decision Microsoft made to release patches on Tuesday for unsupported versions of Windows was prompted by three NSA exploits that remained unaddressed from April’s ShadowBrokers leak. The worst of the bunch, an attack [...]

‘Industroyer’ malware could be ‘biggest threat’ to major power grids around the world

June 12th, 2017|0 Comments

Last December, government officials in Ukraine launched a probe into a suspected cyberattack on the country's power grid that caused a blackout in the northern part of the capital city of Kiev. It was the [...]

Raspberry Pi owners: Update your Pi to protect against this Linux trojan

June 8th, 2017|0 Comments

A trojan has been discovered that infects the best-selling Raspberry Pi computer and turns it into a machine for mining cryptocurrency. The Linux.MulDrop.14 trojan targets Raspberry Pi boards running older versions of the default Raspbian [...]

Botnets overshadowed by ransomware (in media)

June 7th, 2017|0 Comments

Recently, the much-reported WannaCryptor ransomware attack took the media by storm, receiving considerably more coverage than might have been expected for this type of malware, and overshadowing other internet threats at the same time. More dangerous than [...]

OneLogin data breach may have compromised encrypted information

June 5th, 2017|0 Comments

OneLogin  has admitted that it cannot guarantee the security of encrypted data compromised by a cybercriminal on Wednesday (May 31st). The firm has confirmed that a review is currently underway to investigate the data breach, [...]

$8 trillion ‘to be lost to cybercrime in next 5 years’

June 1st, 2017|0 Comments

Businesses are set lose $8 trillion to cybercrime over the course of the next five years, according to a new report. Juniper Research found that enterprises around the world are more at risk due to [...]

ESET releases decryptor for AESNI ransomware variants, including XData

May 31st, 2017|0 Comments

Releasing master keys for older ransomware variants has become somewhat of a trend these days. Shortly after the release of the updated Crysis decryptor, master keys for some of the variants of the AES-NI family [...]

Google Blacklists Sites Using Logins Over HTTP

May 30th, 2017|0 Comments

In what appears to be yet another effort to encourage site owners to adopt HTTPS, Google is marking newly registered sites that serve login pages or password input fields over HTTP as unsafe, Sucuri and [...]

Report: Mobile ransomware attacks ‘soared’ in 2017, up 250% in Q1

May 23rd, 2017|0 Comments

Kaspersky Lab detected more than 479 million malicious attacks from online sources in Q1 2017 alone, according to a new report. Here's how to stay safe. The global ransomware epidemic continues to make waves, as [...]

Keys for Crysis released, as decryption efforts of WannaCryptor files continue

May 22nd, 2017|0 Comments

While the entire cybersecurity world is focusing on WannaCryptor ransomware and ways to help its victims, someone has released 200 master keys for the latest variants of another notorious ransomware family (detected by our systems [...]

Ignoring software updates? You’re making one of five basic security mistakes

May 19th, 2017|0 Comments

Cybercrime has quickly become a major problem for businesses, governments and citizens all over the globe. While awareness of this multifaceted threat is increasing, we’re still making the same blunder when it comes to cybersecurity, [...]

Shadow Brokers threaten to release even more NSA-sourced malware

May 17th, 2017|0 Comments

The hacking group claims it will launch in June a subscription-based monthly dump of compromised data Late last night, someone claiming to represent Shadow Brokers—the people responsible for releasing stolen NSA hacking tools—posted a new message [...]

Apple users advised to update their software now, as new security patches released

May 16th, 2017|0 Comments

Welcome to the post-WannaCryptor world, where every computer user understands the importance of creating secure backups and applying security patches in a timely fashion. What’s that? You’re not so sure that folks have learnt the [...]

Malicious registry keys: Reflective injection

May 15th, 2017|0 Comments

Over the years, we have witnessed how cybercriminals have developed and implemented sophisticated new techniques to outwit users. That being said, one thing has not changed and remains a constant challenge: ensuring perseverance and avoiding detection both [...]

Microsoft Issues WanaCrypt Patch for Windows 8, XP

May 13th, 2017|0 Comments

Microsoft Corp. today took the unusual step of issuing security updates to address flaws in older, unsupported versions of Windows — including Windows XP and Windows 8. The move is a bid to slow the spread [...]

Big changes in the infosec landscape: Time to take note and take action

May 9th, 2017|0 Comments

Recent events are changing the topography of the threat model and attack methodologies across the board and at record speeds – to say that the impact of the past few weeks in information security news [...]

Why SMBs are at high risk for ransomware attacks, and how they can protect themselves

May 8th, 2017|0 Comments

Ransomware cost businesses more than $1B last year, and SMBs are particularly susceptible to attack. Here are some tips and best practices for keeping your company safe. Ransomware dominated the cyberthreat landscape in 2016, costing [...]

Beware Google Docs phishing attack

May 4th, 2017|0 Comments

Recently, many people received a phishing email from a address that was attached to a malicious Google doc. It seemed to be targeting journalists, as well as yours truly. Once the link is clicked, [...]

IBM admits it sent malware-infected USB sticks to customers

May 3rd, 2017|0 Comments

In a recent support alert issued by IBM, the company noted that some USB drives that shipped with its Storwize systems contained malicious code. IBM accidentally shipped USB drives infected with malware to some customers, [...]

Identity theft is alive and well–and fraudsters keep getting richer

May 2nd, 2017|0 Comments

Last year, cyber criminals netted 16 billion dollars in the US alone. Find out why fraudsters are so successful and what you can do to stay safe. Identity fraud no longer makes tech-news headlines, and [...]

Not Always Picture Perfect! 🙂

May 2nd, 2017|0 Comments

Sometimes it takes a nose swap to make the pre-picture perfect....

NSA to end warrantless collection of emails and texts about foreign targets

May 1st, 2017|0 Comments

The National Security Agency will stop collecting Americans' emails and texts to people from other countries, and/or those that mention someone who is currently under surveillance. The National Security Agency (NSA) will no longer collect [...]

Fake Chrome extensions inject code into web pages

April 28th, 2017|0 Comments

Recently, here at our research lab, we have seen an increase in the number of JS/Chromex.Submelius threats detected. In countries like Colombia, Peru, Ecuador and Chile, the detection levels for this particular threat have been as high [...]

DataField Catered Food from On The Border to Support Autism Awareness

April 26th, 2017|0 Comments

Just some of the delicious food brought into the office today! I should have definitely opened up the containers before taking the picture!

Scam calls: Can you hear me, mother?

April 26th, 2017|0 Comments

Sandy Powell was a Yorkshire-born comedian who was well known for the catchphrase ‘Can you hear me, mother?’, with which he used to introduce his radio shows. It may not sound particularly amusing nowadays, but [...]

Online shoppers are losing trust in e-commerce, study finds

April 25th, 2017|0 Comments

According to a global survey from the Centre for International Governance Innovation, almost half of all respondents say they don't trust online shopping. Users are losing trust in the internet, at least when it comes [...]

Young cybercriminals ‘more motivated by peer respect than financial gain’

April 24th, 2017|0 Comments

An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain. That is the main finding from a new report published by the UK [...]

5 mobile security precautions nobody should ignore

April 21st, 2017|0 Comments

Mobile security should be on your list of things to take seriously. Jack Wallen tells you why and gives you some tips on making it happen. I've heard all of the excuses, every one of [...]

Facebook offers account recovery service that’s more secure than email

April 19th, 2017|0 Comments

Facebook's new Delegated Account Recovery service, announced Tuesday at the company's annual F8 developer's conference in San Jose, CA, provides a new way to re-gain access to online accounts that may be safer than using [...]

New training platform uses real-world situations to train cybersecurity experts faster

April 19th, 2017|0 Comments

ISACA's Cybersecurity Nexus Training Platform and Assessment Tool offers on-demand, hands-on training and skills assessment in a live lab environment. Here's how it can help your employees. Many enterprises report increasing difficulties finding skilled cybersecurity [...]

Shoney’s Hit By Apparent Credit Card Breach

April 17th, 2017|0 Comments

It’s Friday, which means it’s time for another episode of “Which Restaurant Chain Got Hacked?” Multiple sources in the financial industry say they’ve traced a pattern of fraud on customer cards indicating that the latest [...]

Smartphone sensors ‘can reveal PINs and passwords’

April 12th, 2017|0 Comments

A smartphone’s internal sensors may provide cybercriminals with enough information to be able to guess a user PINs and passwords, according to new research by Newcastle University in the UK. Experts found that PINs and [...]

Alleged Spam King Pyotr Levashov Arrested

April 10th, 2017|0 Comments

Authorities in Spain have arrested a Russian computer programmer thought to be one of the world’s most notorious spam kingpins. Spanish police arrested Pyotr Levashov under an international warrant executed in the city of Barcelona, according to [...]

More Light it up Blue at DataField to Support Autism Awareness!

April 8th, 2017|0 Comments


Light it up Blue at DataField to Support Autism Awareness!

April 7th, 2017|0 Comments

Self-Proclaimed ‘Nuclear Bot’ Author Weighs U.S. Job Offer

April 7th, 2017|0 Comments

The author of a banking Trojan called Nuclear Bot — a teenager living in France — recently released the source code for his creation just months after the malware began showing up for sale in cybercrime forums. [...]

IoT company bricks customer’s device after negative review

April 6th, 2017|0 Comments

In a shining example of what not to do when you own a company, Garadget, which sells internet-connected garage door openers, recently bricked a customer's device after the customer left a negative review for its [...]

Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Play

April 5th, 2017|0 Comments

Based on ESET’s notice, Google has removed another malicious app from its official Android app store. It had received 100,000-500,000 downloads since November 2016. Unlike typical downloaders, ransomware and similar nasty stuff, this app – [...]

The right to privacy in the digital era

April 3rd, 2017|0 Comments

Discussions around personal data protection in the European Union have drawn attention to the right of citizens to secure their privacy, a right that has been a constant concern over the years. This is especially [...]

Close to 1.4 billion data records compromised in 2016

March 29th, 2017|0 Comments

Over a billion data records were compromised globally in 2016, according to Gemalto’s latest Breach Level Index. The report revealed that close to 1.4 billion records were involved in some sort of data breach, representing [...]

40% of industrial computers were hacked in 2016, here are 5 ways to protect your business

March 29th, 2017|0 Comments

Nearly 40% of industrial computers experienced cyberattacks in the second half of 2016, according to a new report from Kaspersky Lab, released Tuesday. And these attacks are on the rise: The percentage of targeted industrial [...]

Apple underwhelmed by latest CIA exploits revealed by WikiLeaks

March 27th, 2017|0 Comments

Earlier this month WikiLeaks made the headlines releasing what claimed to be leaked secret CIA documents detailing methods by which it exploited vulnerabilities and used hacking tools to spy upon persons of interest. The “Vault [...]

GDPR: A simple explainer

March 24th, 2017|0 Comments

The General Data Protection Regulation (GDPR) is the biggest change in data protection laws for 20 years, and when it comes into effect on May 25th, 2018, it intends to give European citizens back control [...]

ABTA experiences data breach

March 21st, 2017|0 Comments

The Association of British Travel Agents (ABTA) has suffered a major data breach, affecting thousands of customers. As some news providers have observed, it took the UK’s largest holiday and travel association 16 days to [...]

Why top ISPs don’t think your web history or app usage is ‘sensitive information’

March 20th, 2017|0 Comments

Internet service providers (ISPs) said that web browsing and app usage history should not be considered "sensitive information," according to a recent filing with the Federal Communications Commission (FCC). The CTIA, an advocacy group representing [...]

Hack Brief: High-Profile Twitter Accounts Overrun With Swastikas

March 17th, 2017|0 Comments

LAST NIGHT, A swath of Twitter accounts with large followings—including Duke University, BBC North America, Forbes, and Amnesty International—tweeted out the same message, in Turkish, that included a swastika and hashtags that translate to “Nazi [...]

Adobe, Microsoft Push Critical Security Fixes

March 15th, 2017|0 Comments

Adobe and Microsoft each pushed out security updates for their products today. Adobe plugged at least seven security holes in its Flash Player software. Microsoft, which delayed last month’s Patch Tuesday until today, issued an unusually large [...]

Home Depot agrees to $25 million settlement for data breach

March 15th, 2017|0 Comments

US retail giant Home Depot is set to pay a $25 million settlement in relation to a data breach suffered in 2014. The incident reportedly saw the credit and debit cards of 56 million people [...]

FBI won’t release iPhone hacking tool

March 15th, 2017|0 Comments

The tool used by the FBI to unlock an iPhone used by San Bernardino shooter, Syed Farook, will remain under wraps for now. On Monday, a court filing from FBI records management division section chief [...]

10 ways to ruin a cybercriminal’s day

March 6th, 2017|0 Comments

Technology has changed the way we live, our relationships with others, and even how we take care of ourselves. These days, everyone – from the most inexperienced to the most advanced user – takes measures [...]