Categories
Articles
A web developer’s primer on CORS, CSP, HSTS, and all the web security acronyms! Photo...
Wannabe crooks can buy an ATM malware on a Darknet market for around $5000, the discovery was...
Photo Courtesy of Pixabay The European Union (EU) has always strived to...
We all know we're supposed to back up our data; it's essential for peace of mind. But one copy...
Ransomware continues to be a huge problem for companies and consumers—and a major source of...
Photo by Vijay Putra from Pexels Enterprise cyberattacks are growing more...
Users of Avast-owned security application CCleaner for Windows have been advised to update...
Threat landscapes change every second. As attackers evolve, becoming more dynamic and devious,...
This is a guest post coordinated by Rebecca Nehme who works for Thales’ Cybersecurity program...
Distributed Denial of Service (DDoS) attacks aim to take an organization or service offline...
There’s no doubt that the internet has changed our lives in countless positive ways, but...
Ο Υπεύθυνος Προστασίας Δεδομένων (ΥΠΔ) είναι υπεύθυνος για την παρακολούθηση της συμμόρφωσης με...
WHOIS, a protocol used to query databases for domain name ownership information, will likely be...
With the General Data Protection Regulation (GDPR), the European Union’s new privacy law, coming...
Previously, we posted a proposal to mark all HTTP pages as definitively “not secure” and remove...
The FBI’s intention is to have U.S. firms remove Kaspersky out of their PC’s as early as possible...
nd victims aren't reporting ransomware attacks... Online extortion, tech support scams and...
Some users are reporting that they are unable to post today’s big story about a security...
ILLUSTRATION: SALLY THURER FOR BLOOMBERG BUSINESSWEEK Over and over in the last 20 years...
Free Wi-Fi is awesome, no doubts here. But public networks hide numerous hazards, including...
Ο κανονισμός για την προστασία των δεδομένων καθορίζει τα δικαιώματα των φυσικών προσώπων,...
By now, you've probably received at least one email from a company asking you to confirm that you...
ANALYZING THE RELATIONSHIP BETWEEN HUMAN BEHAVIOR, SECURITY AND THE APPLICATIONS THAT DRIVE US...
A report from the FBI and the US Department of Homeland Security warns of malware attacks...
Hackers at work “Playfully doing something difficult, whether useful or not,...
How do computers and the internet work? - Computer Science Basics Have you ever wondered...
“Only the paranoid survive.” — Andy Grove Andy Grove was a Hungarian refugee who escaped...
Jammie Thomas-Rasset always...
Whenever we talk about WordPress and security, it’s important to address one question right off...
What is GDPR? The GDPR website states "The aim of the GDPR is to protect all EU citizens from...
Source — https://www.eugdpr.org/eugdpr.org.html I have been reading about General Data...
As of Version 3.7, WordPress ships with automatic maintenance and security updates. That means if...
This “must-read” guide for application security and risk management professionals provides...
You already know that when you set up your WordPress site, the account that you set up for the...
Threat Intel’s ‘History of…’ series will look at the origins and evolution of notable...
Cyber criminals are using modern-day online advertising techniques to target end users, mess with...
Status Report From: NASA HQ Posted: Tuesday, December 18, 2018 Potential PII Compromise of NASA...
Security researchers have discovered a new fileless ransomware in the wild, which injects...
We all thought that evil genius Evgeniy Bogachev had retired at the Black Sea with his tens of...
Are You Ready for the California Consumer Privacy Act? California has...
People who exercise with fitness trackers have a digital record of their workouts. They do it...
Editor’s Note: The following blog post is a partial summary of our customer webinar...
The extortion virus called WannaCrypt has infected tens of thousands of computers around the...
South Korean web hosting company Nayana agreed to pay $1 million in Bitcoin after a ransomware...
Imagine someone in your life — a parent, a sibling or a close friend — has found love after...
Internet bad guys are increasingly trying to circumvent your spam filters and instead are...
According to the NY Daily News, State Supreme Court Justice Lori Sattler was in the process of...
Enterprises are increasingly aware of the need to protect their systems and users from...
(Sequel here: Blockchain is not only crappy technology but a bad vision for the future.)...
Mention the dark web and many people summon imagery of a massive, mysterious online criminal...
Cybercriminals know no bounds and will stop at nothing to steal your data using...
A Chinese infosec researcher has reported about an "almost impossible to detect" phishing...
Security researchers have discovered a list of thousands of Telnet credentials that enables...
5 most important vulnerabilities every developer should be aware of It takes 20...
Photo by MILKOVÍ / Unsplash Some conversations are easy; some are difficult. Some are...
What is it like to work in cyber security? We ask some of the members of the team in Symantec....
Welcome to the movies, everyone! Have you ever heard the term white hat or black hat hacker,...
We have a serious problem, and it just buzzed in your pocket....
Recently, Microsoft claimed that no known ransomware could penetrate the new Win10 Creators...
Backing up WordPress An important part of data security, whether it be your own data on a...
What is it like to work in cyber security? We ask some of the members of the team in Symantec....
What is it like to work in cyber security? We ask some of the members of the team in Symantec....
What is it like to work in cyber security? We ask some of the members of the team in Symantec....
There are many different job opportunities in cyber security companies, and not all are...
The recent surge in cryptocurrency prices could give website...
A newly discovered flaw in the widely used Wi-Fi encryption protocol – WPA2 – could leave...
Haters gonna hate, as the saying goes. SEO is no exception. If you’re ranking well for...
Powered by WHMCompleteSolution