Top

LATEST PUBLICATIONS



4 steps to prevent spear phishing

June 16, 2021

It seems like not a day goes by without another ransomware attack making headlines. And where do many of these attacks start? In your users’ email inboxes. By now you know that your users are both your first line of […]


Cybersecurity Tips for Business Travelers: Best Practices for 2021

June 11, 2021

As we emerge from the pandemic, organizations will confront a new world of business travel and a new world of cybersecurity tips for travelers. What has changed? What hasn’t changed? The particular cybersecurity risks and threats that might face business […]


IoT Security: Thieves Are Targeting Smart Cameras — Here’s How To Stop Them

June 3, 2021

Among the many important aspects of Internet of things (IoT) security, live cameras are one of the most open to misuse. People have been video snooping, watching private cameras and doing other sketchy things around connected cameras for many years. […]


Hacker, Threats & Malware

Oleg Koshkin was convicted for operating a crypting service also used by Kelihos botnet

June 17, 2021

Via: Security Affairs

Russian national Oleg Koshkin was convicted for charges related to the operation of a malware crypting service used by the Kelihos botnet to obfuscate malware and evade detection. “According to court documents and evidence introduced at trial, Oleg Koshkin, 41, […]


Privacy protection, Security

Almost all popular health apps are harvesting user data

June 17, 2021

Via: TechRadar

An analysis of more than 20,000 mobile health apps on the Google Play Store reveals that a majority of them collect and track user data. The research, published in the British Medical Journal, set out to investigate the type of […]


Threats & Malware, Vulnerabilities

This nasty security vulnerability could turn millions of smart devices into spying tools

June 16, 2021

Via: TechRadar

A security vulnerability has been identified in software deployed across millions of internet-connected devices with audio and video functionality. According to researchers at Nozomi Networks, the flaw could allow attackers to effectively turn smart devices – such as baby monitors, […]