Security
IT Security

Links

  • 10 General Data Protection Regulation (GDPR) questions

    In case you missed it: 10 of your questions from our GDPR webinars
  • D-Link router Vulnerability

    Using a D-Link router? Watch out for hardcoded backdoors that give hackers admin access. D-Link's DIR-620 routers contain four recently discovered firmware flaws that an attacker could use to take over a network, and D-Link has no plans to fix them.
  • Adobe Flash Player gets update to fix two critical vulnerabilities

    Adobe has just released Adobe Flash Player 28.0.0.161,to fix two critical bugs spotted in the wild.
  • Cryptomining Supply Chain Attack Hits Government Websites

    This is another kind of supply chain attack that affects the “trusted relationship between software vendors or authors and their customers”. You trust a service distributing JavaScript to maintain site security....
  • The Future of Authentication in a Hyper Connected World

    The Future of Authentication in a Hyper Connected World
  • RAT Distributed Via Google Drive Targets East Asia

    Researchers said that they are tracking a new remote access Trojan dubbed UBoatRAT that is targeting individuals or organizations linked to South Korea or the video game industry.
  • 6 tips for avoiding phishing, malware, scams, and hacks while holiday shopping online

    6 tips for avoiding phishing, malware, scams, and hacks while holiday shopping online
  • The top 10 worst ransomware attacks of 2017, so far

    Ransomware variants NotPetya, WannaCry, and Locky are among those that wreaked havoc for businesses worldwide this year.
  • How To Phish Like The Bad Guys

    Learn how the adversary using social engineering techniques to exploit their victims.
  • 10 of the most dangerous malware threats on the internet today

    Not all malware threat receives high attention or makes the news but they been around for a while throughout various transformation from hackers.
  • 10 Tips For Reducing Insider Security Threats

    Insider threats can pose greater risks to company data than those associated with external attacks. Here are some techniques to help you spot and mitigate them as quickly as possible.
  • 10 browser extensions to keep you safe on the web

    This article from TechRepublic shared the tips on how to utilize the following browser extensions to help protect you from common threats from web sites.
  • 10 Tips: How to make your employees care about cybersecurity

    People are the biggest security vulnerability in any organization. Here's some expert advice on how to make cybersecurity training more effective and protect your business.
  • WannaCry: The smart person guide

    WannaCry, also known as WannaCrypt, has spread around the world through a crafty attack vector and an ability to jump from machine to machine. Here's what you need to know about this security threat.
  • Webminar: Stopping Malware Before It Reaches Your Network

    Free Webinar: Stopping Malware Before It Reaches Your Network
  • HP issues fix for 'keylogger' found on several laptop models

    HP issues fix for 'keylogger' found on several laptop models
  • The godfather of ransomware returns: Locky is back and sneakier than ever

    The ransomware that drove last year's boom in file-encrypting malware is back, and this time it's even harder to detect.
  • Security 101: BYOD Best Practices: What You Need to Know and Do

    Security 101: BYOD Best Practices: What You Need to Know and Do
  • 5 Security Questions For Your Hosting Company

    5 Security Questions For Your Hosting Company
  • Deep Packet Inspection: The Smart Person's Guide

    This comprehensive guide covers everything you need to know about deep packet inspection, the practice of sniffing web connections to reveal sensitive user data and fend off cyberattacks.
  • View More