Latest Articles

Ransomware

Android ransomware in 2017: Innovative infiltration and rougher extortion

Android ransomware in 2017: Innovative infiltration and rougher extortion

Ransomware

Android ransomware in 2017: Innovative infiltration and rougher extortion

Ransomware in 2017 saw users and businesses across the globe trying to cope with campaigns such as Petya and WannaCryptor. Not to be outdone, Android ransomware had a year full of innovative infiltration and rougher extortion as highlighted by the latest ESET research whitepaper.

Ondrej Kubovič15 Feb 2018


Digital Security

Patch now! Microsoft fixes over 50 serious security flaws

Patch now! Microsoft fixes over 50 serious security flaws

Digital Security

Patch now! Microsoft fixes over 50 serious security flaws

This week saw the second Tuesday of the month, and everyone who is responsible for protecting Windows computers knows what that means: another bundle of security patches have been released by Microsoft.

Graham Cluley14 Feb 2018


Internet of Things

How safe are you around your smart TV?

How safe are you around your smart TV?

Internet of Things

How safe are you around your smart TV?

Smart TVs afford us the opportunity to use them for purposes that are more commonly associated with computers. In fact, that’s what these TVs have become – internet-connected ‘computers’, much like mobile phones. It would no doubt help if we thought of them as such and treated them accordingly.

Tomáš Foltýn14 Feb 2018


Privacy

Blockchain Hardened devices: Can they restore privacy with security by design?

Blockchain Hardened devices: Can they restore privacy with security by design?

Privacy

Blockchain Hardened devices: Can they restore privacy with security by design?

These developments show that security technology is now keeping up, or outpacing other technological and regulatory developments. Thus, while users’ wants often continue to trump their appreciation of risk, the industry has responded and in many cases gotten ahead of popular demand.

Tony Anscombe13 Feb 2018


US and UK government websites hijacked to mine cryptocurrency on visitors’ machines

US and UK government websites hijacked to mine cryptocurrency on visitors’ machines

US and UK government websites hijacked to mine cryptocurrency on visitors’ machines

If undetected by a user’s security solution or content- or ad-blocker, the script ran in the background unbeknown to the user until the webpage was closed. A number of the affected websites, including that of the ICO, were also offline for hours in the aftermath of the attack.

Tomáš Foltýn12 Feb 2018


All HTTP websites to soon be marked as "not secure" by Google Chrome

All HTTP websites to soon be marked as "not secure" by Google Chrome

All HTTP websites to soon be marked as "not secure" by Google Chrome

If you're still running a website that is still using insecure HTTP then it's time to wake up and drink the coffee. Because unless you take action soon, you're going to find many of your visitors are going to distrust your website.

Graham Cluley12 Feb 2018


Digital Security

How will WPA3 improve WiFi security?

How will WPA3 improve WiFi security?

Digital Security

How will WPA3 improve WiFi security?

This is aimed at improving security at the time of the handshake, which is when the key is being exchanged. As a result, WPA3 is poised to provide robust security even if short or weak passwords are used, i.e. those that don’t contain a combination of letters, numbers and symbols.

Cecilia Pastorino09 Feb 2018


Cybercrime

Global cybercrime behemoth busted, 36 people indicted

Global cybercrime behemoth busted, 36 people indicted

Cybercrime

Global cybercrime behemoth busted, 36 people indicted

According to US authorities, the enterprise aimed at becoming the premier destination for the buying and selling of stolen payment card data and forged identification documents. It is believed that the losses that the Infraud Organization had intended to cause were north of $2.2 billion.

Tomáš Foltýn08 Feb 2018


Digital Security

UK-led police operation quashes Luminosity Link RAT

UK-led police operation quashes Luminosity Link RAT

Digital Security

UK-led police operation quashes Luminosity Link RAT

The investigation showed that the tool, which required little technical knowledge to deploy, had over 8,600 users in 78 countries. Victims are believed to be in the thousands.

Tomáš Foltýn07 Feb 2018


Scams

FBI warns of email scams claiming to be from Bureau

FBI warns of email scams claiming to be from Bureau

Scams

FBI warns of email scams claiming to be from Bureau

Another template attempts to scare, rather than thrill, the recipients. Upon learning that “your IP address and other identifying information were used to commit multiple online crimes”, the mark is urged to contact the sender by phone immediately.

Tomáš Foltýn06 Feb 2018


How To, Mobile Security

Think you have a tracker on your phone? Learn how to make your device more resilient

Think you have a tracker on your phone? Learn how to make your device more resilient

How To, Mobile Security

Think you have a tracker on your phone? Learn how to make your device more resilient

While it certainly doesn’t hurt to ask for help from local law enforcement, know that even major cities may not have the expertise or the bandwidth to investigate compromised mobile devices. The most important objective is to take steps to make sure you’re safe. Ask for help, but do not wait for others to help you.

Lysa Myers06 Feb 2018


Vulnerabilities reached a historic peak in 2017

Vulnerabilities reached a historic peak in 2017

Vulnerabilities reached a historic peak in 2017

In 2017, the number of vulnerabilities smashed records set in previous years. According to CVE Details, more than 14,600 vulnerabilities were reported in 2017, compared to 6447 in 2016.

Miguel Ángel Mendoza05 Feb 2018


Threat Report
MSP Program