Articles

A quick introduction to web security

A web developer’s primer on CORS, CSP, HSTS, and all the web security acronyms!   Photo...

ATM malware offered for $5000 at DarkNet !

Wannabe crooks can buy an ATM malware on a Darknet market for around $5000, the discovery was...

After the GDPR Comes ePrivacy

  Photo Courtesy of Pixabay The European Union (EU) has always strived to...

Backup Guidelines

We all know we're supposed to back up our data; it's essential for peace of mind. But one copy...

Backup and recovery means you can say no to ransom demands

Ransomware continues to be a huge problem for companies and consumers—and a major source of...

Business Cyber Threats 2019

    Photo by Vijay Putra from Pexels Enterprise cyberattacks are growing more...

CCleaner - Hacked

Users of Avast-owned security application CCleaner for Windows have been advised to update...

Cloudflare: Announcing Firewall Rules

Threat landscapes change every second. As attackers evolve, becoming more dynamic and devious,...

Cybersecurity explained to your grandparents

This is a guest post coordinated by Rebecca Nehme who works for Thales’ Cybersecurity program...

DDoS Attacks & Response

  Distributed Denial of Service (DDoS) attacks aim to take an organization or service offline...

Data Privacy 2021 Tips

  There’s no doubt that the internet has changed our lives in countless positive ways, but...

Data Protection Officer (Cyprus)

Ο Υπεύθυνος Προστασίας Δεδομένων (ΥΠΔ) είναι υπεύθυνος για την παρακολούθηση της συμμόρφωσης με...

Disappearing Data: WHOIS Blackout will likely start May 25, 2018

WHOIS, a protocol used to query databases for domain name ownership information, will likely be...

Email consent under GDPR

With the General Data Protection Regulation (GDPR), the European Union’s new privacy law, coming...

Evolving Chrome's security indicators

Previously, we posted a proposal to mark all HTTP pages as definitively “not secure” and remove...

FBI wants private firms and government organizations to stop using Kaspersky

The FBI’s intention is to have U.S. firms remove Kaspersky out of their PC’s as early as possible...

FBI: "Extortion And CEO Fraud Are The Top Online Fraud Complaints"

nd victims aren't reporting ransomware attacks... Online extortion, tech support scams and...

Facebook 50 millions users hacked

Some users are reporting that they are unable to post today’s big story about a security...

Facebook is one of the "Why's" we need a Data Protection Agency

ILLUSTRATION: SALLY THURER FOR BLOOMBERG BUSINESSWEEK Over and over in the last 20 years...

Free Wi-Fi Cybersecurity tips

Free Wi-Fi is awesome, no doubts here. But public networks hide numerous hazards, including...

GDPR - Greek

Ο κανονισμός για την προστασία των δεδομένων καθορίζει τα δικαιώματα των φυσικών προσώπων,...

GDPR: 15 (good & bad) examples of repermissioning emails & campaigns

By now, you've probably received at least one email from a company asking you to confirm that you...

Global Study - Application Intelligence Report

ANALYZING THE RELATIONSHIP BETWEEN HUMAN BEHAVIOR, SECURITY AND THE APPLICATIONS THAT DRIVE US...

Got "Russia = BadGuys" Fatigue Yet? They Just Phished a Nuclear Site

A report from the FBI and the US Department of Homeland Security warns of malware attacks...

Hacker's world

  Hackers at work “Playfully doing something difficult, whether useful or not,...

How computers and internet work

How do computers and the internet work? - Computer Science Basics   Have you ever wondered...

How to encrypt your online life in less than an hour !

“Only the paranoid survive.” — Andy Grove Andy Grove was a Hungarian refugee who escaped...

Internet Regulation Can Go Really Wrong

      Jammie Thomas-Rasset always...

Is your WordPress website secure?

Whenever we talk about WordPress and security, it’s important to address one question right off...

Is your WordPress, GDPR ready? Here are some easy tips for you !

What is GDPR? The GDPR website states "​The aim of the GDPR is to protect all EU citizens from...

Is your website GDPR ready? Risk breaching data and pay up to €20 Million?

Source — https://www.eugdpr.org/eugdpr.org.html I have been reading about General Data...

Keeping WordPress up to date

As of Version 3.7, WordPress ships with automatic maintenance and security updates. That means if...

Learn how Mobile AST is different from traditional AST and is pervading the enterprise in this research from Gartner

This “must-read” guide for application security and risk management professionals provides...

Limit WordPress Admin access

You already know that when you set up your WordPress site, the account that you set up for the...

Maliciously Mobile: A Brief History of Mobile Malware

Threat Intel’s ‘History of…’ series will look at the origins and evolution of notable...

Malvertising: Technological or Psychological Warfare?

Cyber criminals are using modern-day online advertising techniques to target end users, mess with...

Nasa Data Breach 2018

Status Report From: NASA HQ Posted: Tuesday, December 18, 2018 Potential PII Compromise of NASA...

New Fileless, Code-Injecting Ransomware Bypasses Antivirus

Security researchers have discovered a new fileless ransomware in the wild, which injects...

New Massive Wave of CryptoLocker Ransomware Infections

We all thought that evil genius Evgeniy Bogachev had retired at the Black Sea with his tens of...

New Regulation - California Consumer Privacy Act (CCPA)

Are You Ready for the California Consumer Privacy Act?   California has...

Opt-out fitness data sharing leads to massive military locations leak

People who exercise with fitness trackers have a digital record of their workouts. They do it...

Prioritizing Threats with Real-Time Threat Intelligence

    Editor’s Note: The following blog post is a partial summary of our customer webinar...

Ransomware Apocalypse: WannaCrypt Is the the Largest Virus Attack in History

The extortion virus called WannaCrypt has infected tens of thousands of computers around the...

Ransomware Now Hits Linux - Web Hosting Provider Pays a Million

South Korean web hosting company Nayana agreed to pay $1 million in Bitcoin after a ransomware...

Romance Scams

Imagine someone in your life — a parent, a sibling or a close friend — has found love after...

Scam of the Week: Phishing Moves to Smishing

Internet bad guys are increasingly trying to circumvent your spam filters and instead are...

Scam of the Week: Real Estate Wire Transfer Phishing Fraud

According to the NY Daily News, State Supreme Court Justice Lori Sattler was in the process of...

Secure your data to effectively reduce your business risk

Enterprises are increasingly aware of the need to protect their systems and users from...

Ten years in, nobody has come up with a use for blockchain

(Sequel here: Blockchain is not only crappy technology but a bad vision for the future.)...

The Recorded Future Blog: Going Dark: Fact vs. Fiction on the Dark Web

Mention the dark web and many people summon imagery of a massive, mysterious online criminal...

The Sophistication of Organized Cybercriminals

  Cybercriminals know no bounds and will stop at nothing to steal your data using...

This Phishing Attack is Almost Impossible to Detect On Chrome, Firefox and Opera

A Chinese infosec researcher has reported about an "almost impossible to detect" phishing...

Thousands of telnet credentials has been published online

Security researchers have discovered a list of thousands of Telnet credentials that enables...

Top 5 vulnerabilities

5 most important vulnerabilities every developer should be aware of   It takes 20...

Website Security Myths by Cloudflare

Photo by MILKOVÍ / Unsplash   Some conversations are easy; some are difficult. Some are...

What is like to work in Cybersecurity field?

What is it like to work in cyber security? We ask some of the members of the team in Symantec....

White, Grey, Black, Green, Blue, and Red Hat Hackers Explained

Welcome to the movies, everyone! Have you ever heard the term white hat or black hat hacker,...

Why are we still pretending e-mail is secure?

We have a serious problem, and it just buzzed in your pocket....

Windows 10 Stops Ransomware Cold? Not So Fast!

Recently, Microsoft claimed that no known ransomware could penetrate the new Win10 Creators...

WordPress backups and logins

Backing up WordPress An important part of data security, whether it be your own data on a...

Working in Cyber Security: “Cyber security gave me the chance to see the world”

What is it like to work in cyber security? We ask some of the members of the team in Symantec....

Working in Cyber Security: “Do not limit yourself to what your professor or boss instructs you to do”

What is it like to work in cyber security? We ask some of the members of the team in Symantec....

Working in Cyber Security: “You need to have confidence in yourself”

What is it like to work in cyber security? We ask some of the members of the team in Symantec....

Working in Cybersecurity : No two jobs are the same

There are many different job opportunities in cyber security companies, and not all are...

You have probably been hijacked to mine cryptocurrency. They are using you...

The recent surge in cryptocurrency prices could give website...

Your Wi-Fi is vulnerable ! Easy to crack with #krackattacks

A newly discovered flaw in the widely used Wi-Fi encryption protocol – WPA2 – could leave...

Your website SEO attack

Haters gonna hate, as the saying goes. SEO is no exception. If you’re ranking well for...

Powered by WHMCompleteSolution