Latest Posts

Fa42af438e58b799189dd26386f5870f

Phishing Campaign Abuses Compromised LinkedIn Accounts

September 19, 2017 Added by:Ionut Arghire

A recently observed phishing campaign was abusing compromised LinkedIn accounts to distribute phishing links via private messages and email, Malwarebytes warns.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

BankBot Spreads via Utility Apps in Google Play

September 18, 2017 Added by:Ionut Arghire

Several utility applications distributed through Google Play have been infected with the BankBot Android banking Trojan, TrendMicro reports.

Comments  (0)

366444be7afcee6161a4ad38ddcc1cf0

How to Fail Safe Your Data in the Cloud or When It’s Shared with 3rd Parties

September 12, 2017 Added by:Min-Hank Ho

Whether ephemerally or permanently, data will be shared with 3rd parties and/or stored in the cloud.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

No Such Thing as Too Small to Hack

September 07, 2017 Added by:Avi Bartov

Technology alone does not equal security, as owners and employees must begin to realize that their websites offer a potentially immense value proposition to hackers. An SMB is definitely not too small to care.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

How Secure Are Your Company’s Social Accounts?

September 07, 2017 Added by:Jackson Shaw

It’s really time to start protecting your Facebook, LinkedIn, Twitter, Tumblr, Instagram and all other social media systems with as much security as your accounts payable or human resources system.

Comments  (0)

8259d904d48c0e93d3edf9383230de4c

Enterprise Security in the Age of Advanced Threats

September 05, 2017 Added by:Luis Corrons

What does an advanced cyber-security solution need to look like for enterprises in 2018 and beyond?

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Security Awareness: Watch-Out for Hurricane Harvey Online Scams

August 28, 2017 Added by:Dan Lohrmann

As reported during previous natural disasters and global events, phishing is usually the path of least resistance for the bad guys to get the sensitive data they want without being detected. If they can become you, they can slowly steal the data over time and cover their tracks. In phishing, the bait is a clever message and you are the fish. We fall for the phishing bait, because the phishers are...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why the GDPR is Important to Your Organization

August 14, 2017 Added by:Steve Durbin

The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

NIST Offering Much Needed Guidance for Neglected SMBs

August 11, 2017 Added by:Avi Bartov

The NIST framework provides the much-needed guidance that organizations of any size can use to identify their major risks in cyberspace.

Comments  (0)

F3828ca8c8a9ac7e4fc6a5cc12f52066

What Is Hypervisor-based Security and Why Is It Important in Stopping Zero-Day Exploits?

August 11, 2017 Added by:Bogdan Botezatu

Utilizing the hypervisor for security measures is a crucial paradigm shift, as the number of techniques for utilizing exploits remains very small.

Comments  (0)