The Information Commissioner's Office (ICO) in the United Kingdom has issued a stark reminder and straight-to-the-point warning for all employees who might be tempted to snoop on others’ personal data.
Archives - 2017
Unfortunately, as with every opportunity, there are people who want to benefit from your success without putting in the hard work. Cybercriminals will view the increase in traffic and spending as opportunities to make extra money.
Simple DoS attacks, which are a one-on-one affair, have been all but supplanted by DDoS attacks. The latter involve concerted campaigns from armies of devices conscripted into botnets which, as if lined up and marching in lockstep, aim to knock the unlucky target offline.
If there's one thing we should all have learnt from our years on the internet it should be this: once you say something somewhere, it's very hard to take it back and pretend it never happened.
In a world where money is often represented as numbers moving from one place to another, the difference between types of payment cards may seem a bit nebulous.
Commentary on government struggles to protect internet security while stockpiling cyber vulnerabilities in order to launch attacks and gain intelligence.
In all the cases we investigated, the final payload was a mobile banking trojan. Once installed, it behaves like a typical malicious app of this kind: it may present the user with fake login forms to steal credentials or credit card details.
Cyber vulnerability hoarding? The US government publishes its Vulnerabilities Equities Policy (VEP) and describes the process by which cyber flaws found by agencies such as the NSA are handled.
The high level of fear of cybercrime dovetails with the self-reported rates of victimization, as 25% of the respondents reported that their personal information or that of their household member has been stolen by hackers over the past 12 months.
Unless companies processing citizens’ personal data fully understand the reasoning behind the decisions made based on their machine-learning models, they will find themselves between a rock and a hard place.
These days, journalists and publishers are increasingly concerned about protecting themselves, their work, and their sources. Rightfully so, for we live in a time when nearly every aspect of publishing occurs online.
The biggest news in malware so far this year has been WannaCryptor a.k.a. WannaCry, and one reason that particular ransomware spread so fast was because it used a “top secret” exploit developed by the NSA, an agency known to have dabbled in UEFI compromise.
ESET detected a modified version of Windows Movie Maker that aims to collect money from unaware users. The spread has been boosted by SEO.
In general, these are the most basic and essential precautions any systems manager must consider. However, depending on the system you want to protect, there are some additional issues to take into account.
At present, virtual assistants are a long way from the image depicted in Blade Runner 2049. However, we are seeing companies take major steps in this direction. We have Siri, Cortana, and Alexa, to name but a few.
While this may sound daunting and the consequences of non-compliance are significant, it’s considered unlikely that regulators will make an example of small businesses that can demonstrate they have a plan and have attempted to comply fully with requirements.
If you see yourself often being curious about the behavior of computer threats, maybe it's time you consider getting involved in cybersecurity.
Can you imagine how Dr. Cohen actually created the virus or how Prof. Adleman came up with its name? The work of these men ended up inspiring a constant development of computer defense techniques, and constant research on computer threats
The story of viruses took place in a university laboratory and, keeping in mind the parallelism, we want to show you what is a malware research laboratory like and what exactly happens there.
In 1983, two computer scientists made history and we want to honor their early work. They laid the foundation for research on computer threats, and for what later came to be our mission on antimalware protection.