Benefits of Teaching Hacking Techniques
This article explores the benefits of teaching hacking techniques. Why on earth would I want to do that you may ask? Isn’t that the same as telling someone how to rob a bank? Well, it is, but teaching...
View ArticleNetwork Security Checklist for SMBs
Network Security Checklist for SMBs Our network security checklist for SMBs acknowledges the fact that many small-to-medium sized businesses do not have the resources to dedicate to their network...
View ArticleLack of Cybersecurity Funding? Cost-Effective Solutions for IT Professionals
A chronic lack of cybersecurity funding is a common problem. Network administrators and IT managers alike must learn to deal with a small budget and do more with the money they have available....
View ArticleA Honeypot for Malware Can be of Great Benefit to Your Organization
Have you been considering implementing a honeypot for malware? Attracting malware may seem counterintuitive but there are great benefits to be had from setting up a honeypot. You will attract malware...
View ArticleHow to Identify a Malicious Website
If you want to keep your computers and networks protected from malware, it is important to train your staff how to identify a malicious website. You should also install a powerful web filtering...
View ArticleRansomware Protection: SMBs Must Get Prepared
SMB ransomware infections can be time-consuming, expensive, or catastrophic. Which category an infection falls into will, to a large extent, depend on how you have prepared. If you run a SMB,...
View ArticleGoogle Account Phishing Email Prompts AG Warning
Miss. attorney general Jim Hood has issued a warning to state residents to be extra vigilant after receiving a convincing Google account phishing email. The latest Google account phishing scam attempts...
View ArticleInsider Phishing Scams Targeting UK Tech Companies
Criminals are using a new tactic to con money out of small to medium-sized businesses and startups, and are now using insider phishing scams to convince account department executives to make fraudulent...
View ArticleiOS Malware Boom Expected in 2016
The rise in popularity of Macs, Macbooks, and iPhones has seen even more consumers make the switch from desktops and Android phones. As the number of Apple users grows, so too will the threat from...
View Article2016 Security Threats: Where Your Next Attack May Come From
2014 was a bad year for IT security professionals, and thanks to some large scale cyberattacks, 2015 was not much better. However, what does 2016 have in store? What will be the biggest 2016 security...
View ArticleSecurity Risk From Java Runtime Environment Security Highlighted by RAT...
Kaspersky Lab has recently discovered the extent to which a remote access Trojan is being used by cybercriminals, highlighting the security risk from Java Runtime Environment. Kaspersky Lab discovered...
View ArticleCalifornia Data Breach Report: Majority of Cyberattacks Easily Preventable
According to a February 2016 California data breach report issued by the California attorney general’s office, the majority of data breaches are easily preventable if basic security measures are...
View ArticleMedical Equipment Cybersecurity: Tomographic Scanner Hacked via Hospital Wi-Fi
In recent months, concern has been growing over the lack of medical equipment cybersecurity protections in place at hospitals and medical centers. Healthcare providers are being targeted by...
View ArticleLocky Ransomware: New Threat Installed Using Malicious Word Macros
Locky ransomware is a new threat believed to emanate from the hacking team behind Dridex malware. The new threat is being delivered via spam email and is disguised as a Microsoft Word invoice. If...
View ArticleWireless Device Security Vulnerabilities Are Not Being Addressed
According to a recent report issued by Pwnie Labs, wireless device security vulnerabilities are not being addressed by enterprises even though many wireless devices can be used as backdoors into...
View ArticleRansomware Mitigation Policies Essential to Protect Against Rampant Ransomware
A new report issued by the Institute for Critical Infrastructure highlights the need for organizations to develop ransomware mitigation policies due to the high risk of cyberattacks involving the...
View ArticleEmployee Security Training Can Greatly Improve Security Posture
Employee security training is an essential part of an organization’s defense against cyberattacks, yet many CISOs and CSOs are not conducting regular training. In fact, according to a survey conducted...
View ArticleMicrosoft Makes it Easier to Block Malicious Word Macros in Office 2016
System administrators that do not block malicious Word macros in Office 2016 could be making it far too easy for hackers to compromise their networks. Malicious Word macros are nothing new, but in...
View ArticleIt’s World Backup Day – Could You Recover From a Data Disaster?
Today is World Backup Day – a day when awareness of the need to backup data is raised around the world. It is a day when companies that are not backing up their critical data are encouraged to do so,...
View ArticleFBI Seeks Help To Deal With Enterprise Ransomware Threat
In February, the Federal Bureau of Investigation (FBI) issued an alert over a new ransomware called MSIL (AKA Samas/Samsam/Samsa), but a recent confidential advisory was obtained by Reuters, in which...
View Article
More Pages to Explore .....