Advertisement
Top

Tag: Protection


Network security

Less Than Half of Consumers Take Protective Steps Post-Breach

October 4, 2017

Via: Dark Reading

New data on consumer behavior and identity theft shows most don’t protect themselves after their personal data is compromised. Fewer than 50% of consumers take basic protective steps after their personal information is stolen, according to a report from CyberScout […]


Privacy protection

Tempted to join the games in the crytpcurrency playground?

September 5, 2017

Via: Naked Security

Should central banks be worried about cryptocurrency – Bitcoin, Ethereum, Zcash, Monero and hundreds of others? Perhaps more important, should you – the average, privacy-conscious person or even the not-so-average Dark Web drug dealer – be worried? That depends in […]


Email security

Endpoint Protection: Spotting the Cyber Wolf in Sheep’s Clothing

July 25, 2017

Via: Security Week

When I worked as a Principal Researcher at RSA Labs around year 2000, I was tasked to identify what might affect our revenue stream. “Anything,” I thought. Upon further reflection, I argued that criminals would start trying to steal passwords […]


Virus & Malware

Mac security facts and fallacies

March 10, 2017

Via: Malwarebytes

The idea that there are no viruses for the Mac goes back to the beginning of Mac OS X, at the very beginning of this millennium. Most people associate this idea most strongly with the “I’m a Mac/I’m a PC” […]


Data loss

How to Secure Your Enterprise

March 9, 2017

Via: TrendMicro Blog

Over the past decade, the threat landscape has evolved extensively from the beginnings of worms in 2001 to botnets and spyware in 2005. Now, targeted attacks, mobile threats and destructive crypto-ransomware are a daily reality. The damage caused by these […]


Phishing

10 ways to ruin a cybercriminal’s day

March 7, 2017

Via: We Live Security

Technology has changed the way we live, our relationships with others, and even how we take care of ourselves. These days, everyone – from the most inexperienced to the most advanced user – takes measures to protect themselves from cybercriminals […]


Virus & Malware

7 Hot Security Terms (and Buzzwords) to Know

March 7, 2017

Via: Dark Reading

In the security industry, both buzzwords and the latest terms the industry has coined to describe a new technology or put a new spin on an old one also provide barometer-like clues of where the industry may be heading. What […]


Network security

Trump focuses on perils of cyber crime in proclamation of National Consumer Protection week

March 7, 2017

Via: The Hill

President Trump on Monday declared this week National Consumer Protection Week, underscoring the need to increase awareness about cyber crime. Trump directed industry leaders and government officials to engage in “consumer education activities” across the country to raise awareness about […]


Cyber-crime, Identity theft

6 Tips to Protect you from Identity Theft

February 8, 2017

Via: Zone Alarm

Approximately 15 million residents of the United States are victims of identity theft per year. It’s important to protect yourself by taking certain precautions to ensure your data isn’t vulnerable to hackers. These 6 recommendations will ensure you’re protected against […]


Virus & Malware

The 2016 cyber-security landscape and how it sets the stage for 2017

December 28, 2016

Via: Hot for Security

2016 was a year of premieres and hit and runs – we’ve seen the first malware designed for IoTs, ransomware paralyzing hospitals and massive data leaks disrupting huge companies – twice. To paint a clearer picture of the 2016 cybersecurity […]


Network security

Reality Check: Getting Serious About IoT Security

December 6, 2016

Via: Dark Reading

The Department of Homeland Security is fully justified in urging security standards for the Internet of Things. In an effort to curtail a new and disturbing cyber-attack trend, the Department of Homeland Security has placed Internet of Things (IoT) device […]


Mobile security

Mobile banking Trojans, explained

October 17, 2016

Via: Kaspersky Blog

1. Why do I need to read this? This article will help you to protect the money in your bank account. 2. Mobile banking Trojans — what are they? Every smartphone is a compact computer equipped with its own operating […]


Vulnerabilities

Firefox blocks websites with vulnerable encryption keys

October 3, 2016

Via: CSO Online

To protect users from cryptographic attacks that can compromise secure web connections, the popular Firefox browser will block access to HTTPS servers that use weak Diffie-Hellman keys. Diffie-Hellman is a key exchange protocol that is slowly replacing the widely used […]


Cloud security, Network security

Commerce chief floats protections for businesses to encourage reporting of hacks

September 29, 2016

Via: The Hill

Commerce Secretary Penny Pritzker is floating the idea of giving businesses protections so that they can discuss cyber-attacks with officials without risking any punishment. “Laws and regulations alone cannot protect us from the emerging cyber threats,” Pritzker said at a […]


Hacker, Privacy protection

After bank heists, SWIFT adds new security feature

September 21, 2016

Via: The Hill

The Society for Worldwide Interbank Financial Telecommunication (SWIFT), the banking transactions messaging service that hackers used to steal more than $80 million from the central bank of Bangladesh, is adding a new fraud protection system. Starting in December, the network […]


Cloud security

Security scores for cloud companies on the way

September 20, 2016

Via: InfoWorld

Compromised vendor systems have led to several major data breaches recently. And sometimes, vendors get breached because of a partner’s lax security. A group of tech companies led by Uber are banding together as the Vendor Security Alliance to prevent […]


Virus & Malware

System Watcher gets smarter

September 20, 2016

Via: Kaspersky Blog

Security solutions must be able to perform two big functions: prevention and, if necessary, remediation. Kaspersky Lab’s latest patent is a technology that makes both more effective. The most common approach to prevention is to track what’s going on in […]


Cyber warfare, Security

GCHQ plans to protect the country with a national firewall

September 19, 2016

Via: Security Affairs

The news was announced, during the Billington CyberSecurity Summit held in Washington DC, by the GCHQ director general of cyber security Ciaran Martin. “The NCSC will be based in London and will open in October. Ciaran Martin, currently Director General Cyber at GCHQ […]


Cyber warfare, Editorial, Privacy protection

Forget all cyber-security worries (by using strong awareness policies)

September 15, 2016

Via: Russel Edwards

What should a company mark down as ‘done’ when it comes to a strong cyber-defense internal policy that also depends of its employees, besides using the right software tools? Cyber awareness policies, obviously. We have previously approached the recommended organizational […]


Cyber warfare

Let’s Get Smarter About Security By Working Together

September 15, 2016

Via: Dark Reading

As a collective information security group, we know that we need teamwork, but it often feels like we aren’t a single team rowing together. We have a common cause. We preach working together with IT and the business to achieve security goals. But we […]