Blog 2017-11-20T19:18:12+00:00

Blog

WHATS NEW WITH US

The evolution of ransomware: Get ready for more advanced social engineering tactics

December 15th, 2017|0 Comments

Prepare your company for more sophisticated, complex, and devastating ransomware attacks in 2018, says Avecto COO Andrew Avanessian. https://www.techrepublic.com/videos/the-evolution-of-ransomware-get-ready-for-more-of-the-same/ Ransomware became a massive nuisance for enterprises, SMBs, and consumers in 2017—and that threat is not going [...]

99% of office workers threaten their company’s cybersecurity

December 13th, 2017|0 Comments

Minor actions, like reusing passwords, suggest workers may prioritize convenience over enterprise security, a new report said. https://www.techrepublic.com/videos/video-adopting-a-human-centric-approach-to-cyber-defense/ Virtually all office workers—99%—admit to making at least one action that could threaten a company's cybersecurity, a new [...]

Five programming languages with hidden flaws vulnerable to hackers

December 11th, 2017|0 Comments

Even if developers go above and beyond to avoid flaws that can be exploited by hackers, attackers can often still take advantage of bugs in the design of the underlying programming language. https://www.techrepublic.com/videos/video-what-is-the-fastest-growing-programming-language/ Writing bug-free [...]

20 must-read TechRepublic downloads about IT jobs, Office tips, security basics, and more

December 8th, 2017|0 Comments

Check out these TechRepublic PDF downloads to read investigative reports, in-depth special features, productivity tips, and career advice. https://www.techrepublic.com/videos/what-humans-can-do-better-than-algorithms-and-vise-versa/ In addition to keeping up with the day-to-day news that business and technology leaders need to [...]

You shouldn’t change domain controller network settings, but here’s how to do it if you must

December 8th, 2017|0 Comments

Changing network settings on a domain controller can be a risky ordeal. It's best avoided, but if you must do it make sure to follow these tips. https://www.techrepublic.com/videos/video-microsoft-gives-a-green-light-to-stronger-windows-security/ Active Directory domain controllers (DCs) are probably [...]

Report: 71% of consumers fear AI will infringe on their privacy

December 6th, 2017|0 Comments

Despite optimism from tech leaders, consumers may not be as excited for AI in their lives, a new study found. https://www.techrepublic.com/videos/video-the-real-world-privacy-implications-of-ai-everywhere/ Nearly three-fourths of people say they don't want companies to use artificial intelligence (AI) [...]

Google’s new app privacy standards mean big changes for developers

December 4th, 2017|0 Comments

Android apps will have to make explicit what customer and device data is being used, for what purpose, and when. If devs don't comply, the apps will be flagged with warnings. https://www.techrepublic.com/videos/why-you-should-care-about-privacy/ Google has announced [...]

Girl Scouts to train next generation of cybersecurity, AI, and robotics professionals

December 4th, 2017|0 Comments

Girl Scouts of the USA and Raytheon are partnering to create a national computer science program for middle and high school girls, in efforts to diversify the STEM workforce. https://www.techrepublic.com/videos/video-are-girl-scouts-your-future-cybersecurity-professionals/ The Girls Scouts are continuing [...]

How IBM’s Quad9 service protects users from accessing malicious websites

November 29th, 2017|0 Comments

The company says the new DNS service will block visits to harmful sites while protecting users' privacy. https://www.techrepublic.com/videos/video-ibms-new-dns-was-designed-with-privacy-as-the-top-priority/ IBM recently partnered with Packet Clearing House (PCH) and the Global Cyber Alliance (GCA) to create Quad9, [...]

AWS to increase enterprise security with private endpoint option

November 29th, 2017|0 Comments

The new AWS PrivateLink feature lets SaaS developers build private endpoints to access the service. https://www.techrepublic.com/videos/video-how-to-overcome-employee-resistance-to-new-cybersecurity-policies/ Amazon Web Services (AWS) will let Software as a Service (SaaS) application developers offer private endpoints, the company announced [...]

Firefox Breach Alerts will warn users if they visit a hacked site

November 27th, 2017|0 Comments

A new prototype extension for Firefox will alert an internet user if the website they land on has been breached. https://www.techrepublic.com/videos/how-to-force-firefox-to-forget-your-browser-history/ A new prototype extension for Mozilla Firefox aims to alert users if their personal [...]

Android users: Google is collecting your location data even if location services are off

November 21st, 2017|0 Comments

As long as you're accessing the internet on an Android device, Google can figure out where you are, a new Quartz investigation found. https://www.techrepublic.com/videos/video-everything-business-needs-to-know-about-android-8-oreo/ Android phones are collecting users' location information, even when location services [...]

The future of cyberwar: ​Weaponised ransomware, IoT attacks and a new arms race

November 15th, 2017|0 Comments

Now that cyberwarfare is out of the shadows, here's a taste of what is coming next. https://www.techrepublic.com/videos/video-hackers-are-stealing-data-from-critical-infrastructure/ After at least a dozen years in the shadows, cyberwarfare is gradually emerging into daylight. While cyber weapons were mostly [...]

Cybersecurity predictions for 2018: it’s going to be “a lot more of the same”

November 13th, 2017|0 Comments

Forcepoint's Richard Ford predicts the types of cyberattacks that might plague businesses in the upcoming year. https://www.techrepublic.com/videos/video-four-big-cybersecurity-predictions-for-2018/ When it comes to defending cyberattacks, "this has been a tough year, and 2018 is going to be [...]

Don’t click that! How to spot an invoice impersonation attack that pretends to be from a coworker

November 10th, 2017|0 Comments

Invoice impersonation attacks are on the rise, attempting to download malware that steals victims' credentials. https://www.techrepublic.com/videos/video-how-protect-your-employees-from-phishing-and-pretexting-attacks/ Finance workers are seeing a wave of phishing attacks that send victims a link to a fake invoice that [...]

Report: 77% of companies say IoT has created ‘significant’ security gaps

November 8th, 2017|0 Comments

The majority of companies cannot identify all of the Internet of Things devices connected to their network, according to a new ForeScout report. https://www.techrepublic.com/videos/strategies-for-improving-data-security-for-iot-devices/ While the Internet of Things (IoT) has allowed businesses to become [...]

5 ways to build your company’s defense against a data breach before it happens

November 6th, 2017|0 Comments

Data breaches can be chaotic and stressful episodes. Learn the most effective actions you can take to help plan for these turbulent events. https://www.techrepublic.com/videos/video-interview-how-to-make-your-company-resilient-to-cyber-threats/ Suffering a data breach can be catastrophic for a company — [...]

Why UN cybercrime chief calls attacks an economic issue

November 3rd, 2017|0 Comments

Companies don't just lose valuable information after experiencing a cyberattack, they lose the public's trust as well. "This impacts people's lives," says the UN's Neil Walsh. https://www.techrepublic.com/videos/video-how-institutional-cyber-attacks-undermine-trust/ There isn't a day that goes by where [...]

Insider secrets of a white hat hacker on security that actually works

November 1st, 2017|0 Comments

White hat hacker Marc Rogers knows how to take down your network, or secure it. Here's why businesses and IT should pay attention. https://www.techrepublic.com/videos/how-ethical-hackers-keep-systems-and-data-safe/ We've never had a greater need for security, and it's never [...]

3 simple Ways To Protect Your Data

November 1st, 2017|0 Comments

As passwords become easier to hack, IBM Security's Limor Kessem explains three ways your enterprise can protect itself. https://www.techrepublic.com/videos/video-do-these-3-things-to-keep-yourself-and-your-company-cyber-secure/ Passwords are increasingly becoming easier to hack, meaning that companies must take new actions to protect [...]

Microsoft’s October Patch Batch Fixes 62 Flaws

October 30th, 2017|0 Comments

Microsoft on Tuesday released software updates to fix at least 62 security vulnerabilities in Windows, Office and other software. Two of those flaws were detailed publicly before yesterday’s patches were released, and one of them is already being exploited [...]

Shark Tank’s Robert Herjavec: Cybersecurity at work is everyone’s responsibility

October 27th, 2017|0 Comments

The investor and founder of cybersecurity firm Herjavec Group spoke with TechRepublic about the biggest threats facing businesses, and how all employees can get involved in security. https://www.techrepublic.com/videos/video-do-these-3-things-to-keep-yourself-and-your-company-cyber-secure/ Despite the critical nature of cybersecurity, it [...]

Do These 3 Things To Keep Yourself And Your Company Cyber-Secure

October 25th, 2017|0 Comments

https://www.techrepublic.com/videos/video-america-is-not-prepared-for-a-massive-escalation-of-cyberattacks/ Jenny Soubra, Head of Cybersecurity for Allianz, explains the steps small and middle market businesses can take to ensure they are prepared to mitigate data breaches, ransomware attacks, and infrastru... https://www.techrepublic.com/videos/video-do-these-3-things-to-keep-yourself-and-your-company-cyber-secure/ Limor Kessem, Executive [...]

Nearly Undetectable Microsoft Office Exploit Installs Malware Without An Email Attachment

October 25th, 2017|0 Comments

Security firm Sophos uncovered a zero day exploit that targets a 24-year-old data exchange protocol, and it can be used to silently attack machines with very little means of detection. https://www.techrepublic.com/videos/video-how-to-enable-ransomware-protection-in-the-windows-10-fall-creators-update/ A newly discovered Microsoft [...]

Malware Campaign Targets Security Researchers With Bogus Cyber Conference Document

October 23rd, 2017|0 Comments

Hackers Group 74 are using fake messages from the Cyber Conflict US conference to infect cybersecurity experts with malware, according to a new report from Cisco Talos. https://www.techrepublic.com/videos/video-five-free-anti-malware-tools-that-can-help-foil-the-bad-guys/   Cybersecurity workers, beware: A new malicious [...]

Top Tips To Keep Cybercriminals Out Of Your Home

October 23rd, 2017|0 Comments

Your home is not just bricks and mortar anymore – it is becoming a connected web of technology that needs to be protected. Every new smart  ‘thing’ we bring into our homes – be it [...]

How To Install And Use Uncomplicated Firewall In Ubuntu

October 20th, 2017|0 Comments

The security of your desktop is crucial. To that end, you should know how to manage the firewall. Here's how easy that can be on Linux with Uncomplicated Firewall. It has long been said that [...]

Survey Shows Most Workers Misunderstand Cybersecurity: How To Improve Awareness In Your Organization

October 20th, 2017|0 Comments

A 2017 report from Wombat Security revealed that most US workers don't understand concepts like ransomware and Wi-Fi security. These tips will help you improve user cybersecurity awareness. https://www.techrepublic.com/videos/video-how-to-protect-your-company-from-internal-cyber-threats/ A User Risk Report released by Wombat Security [...]

5 Steps Leaders Can Take To Improve Cybersecurity In Their Organization

October 18th, 2017|0 Comments

Nearly half of companies do not have an overall information security strategy, according to a new report from PwC. Here's how leaders can step up cybersecurity measures. https://www.techrepublic.com/videos/video-how-to-protect-your-company-from-cybercrime/ Despite the rise of ransomware and other [...]

How To Keep Your WordPress Site Secure

October 18th, 2017|0 Comments

SiteLock president Neill Feather explains simple ways the 74 million websites powered by WordPress can remain secure. https://www.techrepublic.com/videos/video-how-to-prevent-your-wordpress-site-from-getting-hacked/ Open source software like WordPress has a reputation for beingless secure than closed source, and that's not [...]

Google Chrome Adds 3 New Antivirus Protections, Improving Security For Windows Users

October 18th, 2017|0 Comments

The new settings, introduced in Chrome for Windows, protect users from hijacked settings, unwanted software, and changes that could impact the user experience. https://www.techrepublic.com/videos/how-to-use-chrome-extensions-to-improve-twitter/ Chrome for Windows users have three new antivirus features for safer [...]

How To Protect Your Windows 10 PC From Ransomware With The Fall Creators Update

October 18th, 2017|0 Comments

The Windows 10 Fall Creators Update includes an amazing new feature: Folder protection against ransomware. Here's how to activate this essential security feature. https://www.techrepublic.com/videos/video-how-to-enable-ransomware-protection-in-the-windows-10-fall-creators-update/ 3 must-have security features in the Windows 10 Fall Creators Update [...]

Businesses Should Update Adobe Flash Immediately To Avoid This Exploit

October 18th, 2017|0 Comments

Kaspersky Lab recently identified an Adobe Flash zero day exploit that has already been used in an attack in the wild. https://www.techrepublic.com/videos/video-five-free-anti-malware-tools-that-can-help-foil-the-bad-guys/ Businesses that use Adobe Flash should update the program in order to avoid [...]

DHS Orders Federal Agencies To Bolster Cybersecurity With HTTPS, Email Authentication

October 18th, 2017|0 Comments

The US Department of Homeland Security will require federal agencies to use web and email encryption practices to enhance their security posture. https://www.techrepublic.com/videos/why-government-is-either-first-or-last-in-new-technology/ On Monday, the US Department of Homeland Security announced a new requirement for federal [...]

KRACK WPA2 Protocol Wi-Fi Attack: How It Works And Who’s At Risk

October 18th, 2017|0 Comments

A vulnerability in the WPA2 protocol used in secured Wi-Fi networks allows hackers to force devices to install arbitrary encryption keys. Here are the details of how the attack works. https://www.techrepublic.com/videos/cybersecurity-in-an-iot-and-mobile-world-3-big-factors/ A vulnerability in the [...]

Sweeping Wi-Fi Security Flaw Has Left Nearly Every Connected Device At Risk

October 18th, 2017|0 Comments

A WPA2 security flaw known as KRACK breaks down the common security protocol, leaving nearly every Wi-Fi-connected device at risk for data theft or hacking. https://www.techrepublic.com/videos/how-can-cybersecurity-professionals-get-better-they-need-to-think-like-hackers/ Nearly all modern, protected Wi-Fi networks and the devices [...]

WPA2 security issues pose serious Wi-Fi safety questions

October 16th, 2017|0 Comments

The WPA2 encryption scheme has been broken leaving Wi-Fi connections open for would-be attackers who could use an attack to read information that was previously believed to have been secure because it was encrypted. ‘KRACK’ [...]

How To Protect Your Systems From Newly-Discovered Dnsmasq Vulnerabilities

October 13th, 2017|0 Comments

Google recently discovered seven vulnerabilities in DNS software Dnsmasq. Here's how to protect your company's operating systems, IoT, and networking devices. http://www.techrepublic.com/videos/video-why-cybersecurity-solutions-are-essential-for-new-iot-products/ Google recently announced that they have discovered seven new vulnerabilities in the Domain Name System [...]

Why These Cybersecurity Researchers Are Automating Vulnerability Assessments

October 13th, 2017|0 Comments

System complexity is preventing humans alone from finding vulnerabilities, so researchers in the UK and at CMU are working to automate an online cybersecurity system support service to help analysts. http://www.techrepublic.com/videos/video-how-stix-and-taxii-give-cyber-defenders-better-weapons/ There is an axiom [...]

US AG rips Silicon Valley Tech Firms, Says Encryption Makes Crime Easier To Hide

October 11th, 2017|0 Comments

The US Deputy Attorney General Rod Rosenstein recently gave a speech criticizing Silicon Valley tech companies for not working with the US government on encryption. http://www.techrepublic.com/videos/5-reasons-encryption-backdoors-are-a-bad-idea/ At a US Naval Academy speech on Tuesday, deputy [...]

60% of Americans Want To Live In A Smart City

October 11th, 2017|0 Comments

A CompTIA report shows that 6 in 10 US citizens are interested in living in a smart city, despite concerns about cybersecurity and budgetary constraints. http://www.techrepublic.com/videos/smart-cities-need-a-robust-cyber-workforce-to-support-iot-and-ai/ The lure of living in a technologically advanced community [...]

Here’s Google’s Biggest Secret To Not Failing At Security

October 9th, 2017|0 Comments

Security is broken for most enterprises. However, Google shows a better way. http://www.techrepublic.com/videos/5-ways-to-protect-yourself-from-data-breaches/ Can we all agree that securing the perimeter of an enterprise's IT assets—through firewalls and such—doesn't work and needs a reboot? In [...]

It’s Time That Companies Became More Cyber-Resilient

October 6th, 2017|0 Comments

This year, we have seen some of the most high-profile victims of cybercrime across the world, including the NHS in the UK, and the attack on Equifax that impacted millions of people in several countries. The damage has not [...]

93% Of Companies Have Password Rules, But It May Not Protect Them From Data Breaches

October 4th, 2017|0 Comments

Only half of companies require employee passwords to be changed quarterly, according to a new survey from OneLogin. http://www.techrepublic.com/videos/never-used-a-password-manager-heres-how-to-get-started/ Weak password policies may be putting your organization at risk for data breaches, according to a [...]

Passwords As We Know Them Are Dying, Here’s What Will Take Their Place

October 4th, 2017|0 Comments

Weak passwords offer many hackers an entry point into enterprises. Here's what the future of security will look like. http://www.techrepublic.com/videos/video-can-big-data-and-machine-learning-kill-two-factor-authentication/ As employees remain the no. 1 cause of company data breaches, it's key for security leaders to [...]

63% of SMBs Increased Security Spending, But More Than Half Still Experienced Breaches

October 2nd, 2017|0 Comments

Ransomware, phishing, and data breaches top IT security managers' list of concerns this year, according to a new report from Cyren and Osterman Research. ]http://www.techrepublic.com/videos/video-simple-steps-to-cyber-safety/ SMB security spending is rising, but confidence in the ability [...]

How To Install Sophos Antivirus On A Linux Server

September 29th, 2017|0 Comments

If you have a Linux server that serves up files to users on your network, you might need a bit of extra protection. Here's how to install and configure Sophos AV on your Linux server. [...]

10 Of The Most Dangerous Malware Threats On The Internet Today

September 29th, 2017|0 Comments

​Not every malware threat makes the news It isn't often that an outbreak like WannaCry hits the tech world, and when it does there's plenty of attention devoted to killing it. High profile malware doesn't [...]

7 Windows 10 Security Features That Could Help Prevent Cyberattacks Against Your Business

September 29th, 2017|0 Comments

With ransomware and spyware on the rise, enterprises need to stay vigilant to protect data from attackers. Here are some native Windows 10 security features that can help. http://www.techrepublic.com/videos/video-here-are-a-few-of-the-ways-windows-10-will-transform-in-2017/ As the cybersecurity threat landscape expands, [...]

5 Critical IT Security Questions Enterprises Need To Answer Now

September 27th, 2017|0 Comments

At Microsoft Envision, Microsoft's president and chief legal officer Brad Smith shared some tips for how companies can gut check their own security strategy. http://www.techrepublic.com/videos/video-how-to-protect-your-company-from-cybercrime/ Companies must address cybersecurity, or else "sentence ourselves to a [...]

Nearly 50% Of Organizations Willing To Pay Extra For Security Guarantee From Cloud Vendors

September 25th, 2017|0 Comments

Despite moving to the cloud for cost savings, most companies are willing to pay extra for certain improvements to their service, a 451 Research report found. http://www.techrepublic.com/videos/the-difference-between-hybrid-cloud-public-cloud-and-private-cloud/ Even though many businesses move to the cloud [...]

Report: 99% of Ransomware Targets Microsoft Products

September 22nd, 2017|0 Comments

A new report from Carbon Black analyzed 1,000 ransomware samples to learn how attackers are using it and how threats are evolving. http://www.techrepublic.com/videos/video-so-your-company-was-hit-with-ransomware-now-what/ The explosive growth of ransomware is bad news for Windows users. Some [...]

Cheat Sheet: How To Become A Cybersecurity Pro

September 22nd, 2017|0 Comments

If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the field. http://www.techrepublic.com/videos/video-how-to-jumpstart-your-cybersecurity-career/ As cybercriminals [...]

Using Malware And Infrared Light, Hackers Can Turn A Security Camera Into A Business Spy

September 20th, 2017|0 Comments

The method, identified by researchers at Ben-Gurion University of the Negev, can be used to infiltrate data or perform malicious attacks. http://www.techrepublic.com/videos/strategies-for-improving-data-security-for-iot-devices/ Security researchers at Ben-Gurion University of the Negev (BGU) were able to use [...]

Infographic: Who Hackers Target During A Cyberattack

September 18th, 2017|0 Comments

A recently-published infographic from CBTS breaks down the different types of cyberattacks and how your company can stay protect itself. Passwords like '12345' and 'password' aren't going to cut it anymore. Hackers target everyone, including [...]

How To Design A Network That Meets All Of Your Users’ Needs

September 13th, 2017|0 Comments

At the VMworld 2017 conference, Moffitt Cancer Center CTO Tom Hull talked about how the hospital designed a network that met its users different needs. http://www.techrepublic.comhttp://www.techrepublic.com/videos/video-tips-for-designing-your-network-to-meet-the-needs-of-different-sets-of-users/ When designing a network, organizations must cater to users' [...]

Equifax Breach: 5 Defensive Steps To Take Now

September 11th, 2017|0 Comments

As you may have heard from the copious news coverage (including our own), the credit monitoring bureau Equifax, was hit with a security breach which has given thieves access to the data of 143 million [...]

New Report Unveils Top 3 Cybersecurity Threats Facing Business Data

September 8th, 2017|0 Comments

For organizations securing sensitive data, ransomware, insider vulnerabilities, and denial of service attacks are their most-feared threats, according to a new report from the SANS and Infoblox. http://www.techrepublic.comhttp://www.techrepublic.com/videos/video-how-visa-mitigates-ddos-ransomware-and-iot-cyber-attacks/ Ransomware, insider threats, and denial of service [...]

Disruptive Cyberattacks Could Hit Energy Infrastructure in US, Europe

September 6th, 2017|0 Comments

A report from Symantec has identified the re-emergence of a hacking group called Dragonfly, which seems to be targeting the energy sector. http://www.techrepublic.comhttp://www.techrepublic.com/videos/video-what-happens-at-the-government-when-a-cybersecurity-threat-is-identified/ A new "wave of cyberattacks" could be poised to hit the energy [...]

10 Tips For Reducing Insider Security Threats

September 5th, 2017|0 Comments

Insider threats can pose greater risks to company data than those associated with external attacks. Here are some techniques to help you spot and mitigate them as quickly as possible. A report recently released by the [...]

How One Marketing Company Used A Cloud Solution To Address Project-Related Security Risks

September 1st, 2017|0 Comments

Keeping company data secure can get tricky when collaborating with remote employees and contractors. Here's how AdRoll, a marketing platform provider, addressed that issue using a cloud-based service. http://www.techrepublic.comhttp://www.techrepublic.com/videos/5-things-to-know-about-cloud-security/ Security risks are not new in [...]

New ESET Research Uncovers Gazer, The Stealthy Backdoor That Spies On Embassies

August 30th, 2017|0 Comments

Security researchers at ESET have released new research today into the activities of the notorious Turla cyberespionage group, and specifically a previously undocumented backdoor that has been used to spy on consulates and embassies worldwide. ESET’s research [...]

VMware AppDefense automates security for apps and data in virtual environments

August 28th, 2017|0 Comments

The solution, two years in the making, relies on intent-based security to protect applications running on virtualized or cloud environments. By Conner Forrest | August 28, 2017, 5:00 AM PST 5 Things To Know About CLOUD Security A [...]

10 browser extensions to keep you safe on the web

August 26th, 2017|0 Comments

You can never be too careful It seems every time you hit F5 there's a new story about a massive corporate hack, a new ransomware outbreak, or the spread of dangerous new malware. Unfortunately, you [...]

Hackers can control damaged phones using replacement screens

August 25th, 2017|0 Comments

Replacement screens for cracked smartphones bought from third party vendors could leave you vulnerable to hackers, a new study has revealed. The research, carried out by Israel’s Ben-Gurion University of the Negev, has shown how hackers [...]

What are the risks of allowing people to use their smartphone at the bank?

August 23rd, 2017|0 Comments

From time to time, our readers raise questions or issues related to topics that concern, or simply interest them. One such issue was brought up recently by a Twitter user, who asked us: “Do you [...]

PlayStation Social Media Accounts Briefly Hacked

August 21st, 2017|0 Comments

Sony became the latest entertainment company to suffer at the fingertips of hackers after their PlayStation social media channels were temporarily hacked on Sunday evening. A group called OurMine claimed credit for the compromise that targeted the [...]

Rogers Cup ‘Tech and Tennis Day’ cybersecurity panel

August 18th, 2017|0 Comments

While you might not think tennis and cybersecurity have much in common, both can be unpredictable and therefore require you to keep your eye on the ball. But unlike a tennis match, cybersecurity is no [...]

Buying encryption? Five good questions to ask before you do

August 17th, 2017|0 Comments

General Data Protection Regulation (GDPR) together with the growing number of data breaches are the most pressing reasons why small and medium businesses are implementing data protection technologies – including encryption. However, with limited time and the market [...]

Google pays $10,000 for student’s bug

August 16th, 2017|0 Comments

Google has rewarded a Uruguayan student with $10,000 after he exposed a security flaw that could allow hackers to access sensitive data. Ezequiel Pereira discovered the vulnerability in Google’s App Engine server after changing the [...]

Gmail now warns iOS users about suspicious links, in fight against phishing threats

August 14th, 2017|0 Comments

Stop! Should you really be clicking on that link you just received in your email? Despite all the headlines about zero-day threats and state-sponsored attacks, the rather less dramatic truth is that the majority of [...]

Avoid getting lost in encryption with these easy steps

August 10th, 2017|0 Comments

Encryption can be the answer to many data security issues faced by small and medium businesses. Not only can it protect sensitive information from unauthorized use and minimize the risks arising from data breaches, implementing this technology [...]

Flash Player is Dead, Long Live Flash Player!

August 7th, 2017|0 Comments

Adobe last week detailed plans to retire its Flash Player software, a cross-platform browser plugin so powerful and so packed with security holes that it has become the favorite target of malware developers. To help eradicate this ubiquitous [...]

Why you should view torrents as a threat

August 2nd, 2017|0 Comments

Despite their popularity among users, torrents are very risky “business”. Apart from the obvious legal trouble you could face for violating the copyright of musicians, filmmakers or software developers, there are security issues linked to [...]

Stantinko: A massive adware campaign operating covertly since 2012

July 24th, 2017|0 Comments

Overview Since the beginning of 2017, ESET researchers have been conducting an investigation into a complex threat mainly targeting Russia and Ukraine. Standing out because of its prevalence and its sophistication, Stantinko turned out to [...]

A major cyberattack could cost the global economy $53 billion

July 18th, 2017|0 Comments

Lloyd’s of London has reported that a serious cyberattack could cost the global economy as much as a devastating natural disaster. According to the Guardian, average losses from a crippling cyberattack are estimated to be around $53 billion. [...]

Why Windows Phone users are now a serious security risk to their employers

July 13th, 2017|0 Comments

Windows Phone is dead. On July 11, Microsoft ended support for the Windows Phone 8.1, effectively killing off the Windows Phone brand. The Windows 10 Phone is still around, but the company hasn't gone out of [...]

Self-Service Food Kiosk Vendor Avanti Hacked

July 10th, 2017|0 Comments

Avanti Markets, a company whose self-service payment kiosks sit beside shelves of snacks and drinks in thousands of corporate breakrooms across America, has suffered of breach of its internal networks in which hackers were able to [...]

Analysis of TeleBots’ cunning backdoor

July 5th, 2017|0 Comments

On the 27th of June 2017, a new cyberattack hit many computer systems in Ukraine, as well as in other countries. That attack was spearheaded by the malware ESET products detect as Diskcoder.C(aka ExPetr, PetrWrap, Petya, or NotPetya). This [...]

Two-factor authentication: An underutilized security measure in businesses

July 3rd, 2017|0 Comments

Whenever a business considers the security measures it can implement, three options always crop up: antivirus on endpoints and servers to detect and eliminate as many threats as possible;  backups to ensure that any data lost in an incident [...]

New WannaCryptor-like ransomware attack hits globally: all you need to know

June 28th, 2017|0 Comments

Update (June 27 – 23.34 CEST): Shutting down the computer and not booting again could prevent the disk encryption, though several files can be already encrypted after the MBR is replaced and further infection through [...]

How to remove geolocation information from a photo in Google Photos

June 26th, 2017|0 Comments

It's vacation season for many people. Time to shrug off the mantle of business and IT and take a dip in the ocean, climb a mountain, visit a museum, or whatever your penchant. While on [...]

Got Robocalled? Don’t Get Mad; Get Busy.

June 26th, 2017|0 Comments

Several times a week my cell phone receives the telephonic equivalent of spam: A robocall. On each occasion the call seems to come from a local number, but when I answer there is that telltale pause [...]

Girl Scouts USA to offer badges on cybersecurity

June 20th, 2017|0 Comments

The Girls Scouts USA (GSUSA) is set to offer badges on cybersecurity, amid growing concerns that women are still being deprived of opportunities to enter the industry. Citing the Computing Technology Industry Association, it said [...]

Seven years after Stuxnet: Industrial systems security once again in the spotlight

June 16th, 2017|0 Comments

June seems to be historically rich in important events relating to the security of industrial systems. For example, June 17th, 2010, may be considered the day that Stuxnet was discovered, the malware behind the very [...]

RARE XP PATCHES FIX THREE REMAINING LEAKED NSA EXPLOITS

June 15th, 2017|0 Comments

The unusual decision Microsoft made to release patches on Tuesday for unsupported versions of Windows was prompted by three NSA exploits that remained unaddressed from April’s ShadowBrokers leak. The worst of the bunch, an attack [...]

‘Industroyer’ malware could be ‘biggest threat’ to major power grids around the world

June 12th, 2017|0 Comments

Last December, government officials in Ukraine launched a probe into a suspected cyberattack on the country's power grid that caused a blackout in the northern part of the capital city of Kiev. It was the [...]

Raspberry Pi owners: Update your Pi to protect against this Linux trojan

June 8th, 2017|0 Comments

A trojan has been discovered that infects the best-selling Raspberry Pi computer and turns it into a machine for mining cryptocurrency. The Linux.MulDrop.14 trojan targets Raspberry Pi boards running older versions of the default Raspbian [...]

Botnets overshadowed by ransomware (in media)

June 7th, 2017|0 Comments

Recently, the much-reported WannaCryptor ransomware attack took the media by storm, receiving considerably more coverage than might have been expected for this type of malware, and overshadowing other internet threats at the same time. More dangerous than [...]

OneLogin data breach may have compromised encrypted information

June 5th, 2017|0 Comments

OneLogin  has admitted that it cannot guarantee the security of encrypted data compromised by a cybercriminal on Wednesday (May 31st). The firm has confirmed that a review is currently underway to investigate the data breach, [...]

$8 trillion ‘to be lost to cybercrime in next 5 years’

June 1st, 2017|0 Comments

Businesses are set lose $8 trillion to cybercrime over the course of the next five years, according to a new report. Juniper Research found that enterprises around the world are more at risk due to [...]

ESET releases decryptor for AESNI ransomware variants, including XData

May 31st, 2017|0 Comments

Releasing master keys for older ransomware variants has become somewhat of a trend these days. Shortly after the release of the updated Crysis decryptor, master keys for some of the variants of the AES-NI family [...]

Google Blacklists Sites Using Logins Over HTTP

May 30th, 2017|0 Comments

In what appears to be yet another effort to encourage site owners to adopt HTTPS, Google is marking newly registered sites that serve login pages or password input fields over HTTP as unsafe, Sucuri and [...]

Report: Mobile ransomware attacks ‘soared’ in 2017, up 250% in Q1

May 23rd, 2017|0 Comments

Kaspersky Lab detected more than 479 million malicious attacks from online sources in Q1 2017 alone, according to a new report. Here's how to stay safe. The global ransomware epidemic continues to make waves, as [...]

Keys for Crysis released, as decryption efforts of WannaCryptor files continue

May 22nd, 2017|0 Comments

While the entire cybersecurity world is focusing on WannaCryptor ransomware and ways to help its victims, someone has released 200 master keys for the latest variants of another notorious ransomware family (detected by our systems [...]

Ignoring software updates? You’re making one of five basic security mistakes

May 19th, 2017|0 Comments

Cybercrime has quickly become a major problem for businesses, governments and citizens all over the globe. While awareness of this multifaceted threat is increasing, we’re still making the same blunder when it comes to cybersecurity, [...]

Shadow Brokers threaten to release even more NSA-sourced malware

May 17th, 2017|0 Comments

The hacking group claims it will launch in June a subscription-based monthly dump of compromised data Late last night, someone claiming to represent Shadow Brokers—the people responsible for releasing stolen NSA hacking tools—posted a new message [...]

Apple users advised to update their software now, as new security patches released

May 16th, 2017|0 Comments

Welcome to the post-WannaCryptor world, where every computer user understands the importance of creating secure backups and applying security patches in a timely fashion. What’s that? You’re not so sure that folks have learnt the [...]

Malicious registry keys: Reflective injection

May 15th, 2017|0 Comments

Over the years, we have witnessed how cybercriminals have developed and implemented sophisticated new techniques to outwit users. That being said, one thing has not changed and remains a constant challenge: ensuring perseverance and avoiding detection both [...]

Microsoft Issues WanaCrypt Patch for Windows 8, XP

May 13th, 2017|0 Comments

Microsoft Corp. today took the unusual step of issuing security updates to address flaws in older, unsupported versions of Windows — including Windows XP and Windows 8. The move is a bid to slow the spread [...]

Big changes in the infosec landscape: Time to take note and take action

May 9th, 2017|0 Comments

Recent events are changing the topography of the threat model and attack methodologies across the board and at record speeds – to say that the impact of the past few weeks in information security news [...]

Why SMBs are at high risk for ransomware attacks, and how they can protect themselves

May 8th, 2017|0 Comments

Ransomware cost businesses more than $1B last year, and SMBs are particularly susceptible to attack. Here are some tips and best practices for keeping your company safe. Ransomware dominated the cyberthreat landscape in 2016, costing [...]

Beware Google Docs phishing attack

May 4th, 2017|0 Comments

Recently, many people received a phishing email from a mailinator.com address that was attached to a malicious Google doc. It seemed to be targeting journalists, as well as yours truly. Once the link is clicked, [...]

IBM admits it sent malware-infected USB sticks to customers

May 3rd, 2017|0 Comments

In a recent support alert issued by IBM, the company noted that some USB drives that shipped with its Storwize systems contained malicious code. IBM accidentally shipped USB drives infected with malware to some customers, [...]

Identity theft is alive and well–and fraudsters keep getting richer

May 2nd, 2017|0 Comments

Last year, cyber criminals netted 16 billion dollars in the US alone. Find out why fraudsters are so successful and what you can do to stay safe. Identity fraud no longer makes tech-news headlines, and [...]

Not Always Picture Perfect! 🙂

May 2nd, 2017|0 Comments

Sometimes it takes a nose swap to make the pre-picture perfect....

NSA to end warrantless collection of emails and texts about foreign targets

May 1st, 2017|0 Comments

The National Security Agency will stop collecting Americans' emails and texts to people from other countries, and/or those that mention someone who is currently under surveillance. The National Security Agency (NSA) will no longer collect [...]

Fake Chrome extensions inject code into web pages

April 28th, 2017|0 Comments

Recently, here at our research lab, we have seen an increase in the number of JS/Chromex.Submelius threats detected. In countries like Colombia, Peru, Ecuador and Chile, the detection levels for this particular threat have been as high [...]

DataField Catered Food from On The Border to Support Autism Awareness

April 26th, 2017|0 Comments

Just some of the delicious food brought into the office today! I should have definitely opened up the containers before taking the picture!

Scam calls: Can you hear me, mother?

April 26th, 2017|0 Comments

Sandy Powell was a Yorkshire-born comedian who was well known for the catchphrase ‘Can you hear me, mother?’, with which he used to introduce his radio shows. It may not sound particularly amusing nowadays, but [...]

Online shoppers are losing trust in e-commerce, study finds

April 25th, 2017|0 Comments

According to a global survey from the Centre for International Governance Innovation, almost half of all respondents say they don't trust online shopping. Users are losing trust in the internet, at least when it comes [...]

Young cybercriminals ‘more motivated by peer respect than financial gain’

April 24th, 2017|0 Comments

An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain. That is the main finding from a new report published by the UK [...]

5 mobile security precautions nobody should ignore

April 21st, 2017|0 Comments

Mobile security should be on your list of things to take seriously. Jack Wallen tells you why and gives you some tips on making it happen. I've heard all of the excuses, every one of [...]

Facebook offers account recovery service that’s more secure than email

April 19th, 2017|0 Comments

Facebook's new Delegated Account Recovery service, announced Tuesday at the company's annual F8 developer's conference in San Jose, CA, provides a new way to re-gain access to online accounts that may be safer than using [...]

New training platform uses real-world situations to train cybersecurity experts faster

April 19th, 2017|0 Comments

ISACA's Cybersecurity Nexus Training Platform and Assessment Tool offers on-demand, hands-on training and skills assessment in a live lab environment. Here's how it can help your employees. Many enterprises report increasing difficulties finding skilled cybersecurity [...]

Shoney’s Hit By Apparent Credit Card Breach

April 17th, 2017|0 Comments

It’s Friday, which means it’s time for another episode of “Which Restaurant Chain Got Hacked?” Multiple sources in the financial industry say they’ve traced a pattern of fraud on customer cards indicating that the latest [...]

Smartphone sensors ‘can reveal PINs and passwords’

April 12th, 2017|0 Comments

A smartphone’s internal sensors may provide cybercriminals with enough information to be able to guess a user PINs and passwords, according to new research by Newcastle University in the UK. Experts found that PINs and [...]

Alleged Spam King Pyotr Levashov Arrested

April 10th, 2017|0 Comments

Authorities in Spain have arrested a Russian computer programmer thought to be one of the world’s most notorious spam kingpins. Spanish police arrested Pyotr Levashov under an international warrant executed in the city of Barcelona, according to [...]

More Light it up Blue at DataField to Support Autism Awareness!

April 8th, 2017|0 Comments

 

Light it up Blue at DataField to Support Autism Awareness!

April 7th, 2017|0 Comments

Self-Proclaimed ‘Nuclear Bot’ Author Weighs U.S. Job Offer

April 7th, 2017|0 Comments

The author of a banking Trojan called Nuclear Bot — a teenager living in France — recently released the source code for his creation just months after the malware began showing up for sale in cybercrime forums. [...]

IoT company bricks customer’s device after negative review

April 6th, 2017|0 Comments

In a shining example of what not to do when you own a company, Garadget, which sells internet-connected garage door openers, recently bricked a customer's device after the customer left a negative review for its [...]

Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Play

April 5th, 2017|0 Comments

Based on ESET’s notice, Google has removed another malicious app from its official Android app store. It had received 100,000-500,000 downloads since November 2016. Unlike typical downloaders, ransomware and similar nasty stuff, this app – [...]

The right to privacy in the digital era

April 3rd, 2017|0 Comments

Discussions around personal data protection in the European Union have drawn attention to the right of citizens to secure their privacy, a right that has been a constant concern over the years. This is especially [...]

Close to 1.4 billion data records compromised in 2016

March 29th, 2017|0 Comments

Over a billion data records were compromised globally in 2016, according to Gemalto’s latest Breach Level Index. The report revealed that close to 1.4 billion records were involved in some sort of data breach, representing [...]

40% of industrial computers were hacked in 2016, here are 5 ways to protect your business

March 29th, 2017|0 Comments

Nearly 40% of industrial computers experienced cyberattacks in the second half of 2016, according to a new report from Kaspersky Lab, released Tuesday. And these attacks are on the rise: The percentage of targeted industrial [...]

Apple underwhelmed by latest CIA exploits revealed by WikiLeaks

March 27th, 2017|0 Comments

Earlier this month WikiLeaks made the headlines releasing what claimed to be leaked secret CIA documents detailing methods by which it exploited vulnerabilities and used hacking tools to spy upon persons of interest. The “Vault [...]

GDPR: A simple explainer

March 24th, 2017|0 Comments

The General Data Protection Regulation (GDPR) is the biggest change in data protection laws for 20 years, and when it comes into effect on May 25th, 2018, it intends to give European citizens back control [...]

ABTA experiences data breach

March 21st, 2017|0 Comments

The Association of British Travel Agents (ABTA) has suffered a major data breach, affecting thousands of customers. As some news providers have observed, it took the UK’s largest holiday and travel association 16 days to [...]

Why top ISPs don’t think your web history or app usage is ‘sensitive information’

March 20th, 2017|0 Comments

Internet service providers (ISPs) said that web browsing and app usage history should not be considered "sensitive information," according to a recent filing with the Federal Communications Commission (FCC). The CTIA, an advocacy group representing [...]

Hack Brief: High-Profile Twitter Accounts Overrun With Swastikas

March 17th, 2017|0 Comments

LAST NIGHT, A swath of Twitter accounts with large followings—including Duke University, BBC North America, Forbes, and Amnesty International—tweeted out the same message, in Turkish, that included a swastika and hashtags that translate to “Nazi [...]

Adobe, Microsoft Push Critical Security Fixes

March 15th, 2017|0 Comments

Adobe and Microsoft each pushed out security updates for their products today. Adobe plugged at least seven security holes in its Flash Player software. Microsoft, which delayed last month’s Patch Tuesday until today, issued an unusually large [...]

Home Depot agrees to $25 million settlement for data breach

March 15th, 2017|0 Comments

US retail giant Home Depot is set to pay a $25 million settlement in relation to a data breach suffered in 2014. The incident reportedly saw the credit and debit cards of 56 million people [...]

FBI won’t release iPhone hacking tool

March 15th, 2017|0 Comments

The tool used by the FBI to unlock an iPhone used by San Bernardino shooter, Syed Farook, will remain under wraps for now. On Monday, a court filing from FBI records management division section chief [...]

10 ways to ruin a cybercriminal’s day

March 6th, 2017|0 Comments

Technology has changed the way we live, our relationships with others, and even how we take care of ourselves. These days, everyone – from the most inexperienced to the most advanced user – takes measures [...]