Latest Articles

Beware Google Docs phishing attack

Beware Google Docs phishing attack

Beware Google Docs phishing attack

Recently, many people received a phishing email from a mailinator.com address that was attached to a malicious Google doc. Beware.

Michael Aguilar04 May 2017


A DDoS attack could cost businesses as much as $2.5 million

A DDoS attack could cost businesses as much as $2.5 million

A DDoS attack could cost businesses as much as $2.5 million

Businesses that fall victim to a DDoS attack could lose, on average, as much as $2.5 million in revenue, new research has suggested.

Narinder Purba03 May 2017


No more pointless password requirements

No more pointless password requirements

No more pointless password requirements

Peter Stancik discusses the new Digital Identity Guidelines drafted by NIST, which offers an update on password security.

Peter Stancik03 May 2017


What motivates some young people to become cybercriminals?

What motivates some young people to become cybercriminals?

What motivates some young people to become cybercriminals?

Sabrina Pagnotta takes a closer look at what motivates some young people to become cybercriminals. You may be surprised to find out some of the reasons.

Sabrina Pagnotta03 May 2017


School's almost out … Don’t let cybercriminals in

School's almost out … Don’t let cybercriminals in

School's almost out … Don’t let cybercriminals in

Cybersecurity should be a priority for educational institutions, says ESET's Lysa Myers. It's important to protect students and staff from cybercriminals.

Lysa Myers02 May 2017


A single protective technology means a single point of failure

A single protective technology means a single point of failure

A single protective technology means a single point of failure

A single protective technology means a single point of failure. A company aiming to build reliable and strong cybersecurity defenses should opt for a solution offering multiple complementary technologies.

Ondrej Kubovič02 May 2017


Cybercriminal holds Netflix to ransom over 'Orange is the New Black'

Cybercriminal holds Netflix to ransom over 'Orange is the New Black'

Cybercriminal holds Netflix to ransom over 'Orange is the New Black'

A hacker claims to have released the new series of the hit prison TV show “Orange is the New Black” onto the internet, after Netflix failed to agree to pay an undisclosed ransom.

Graham Cluley29 Apr 2017


Fake Chrome extensions inject code into web pages

Fake Chrome extensions inject code into web pages

Fake Chrome extensions inject code into web pages

Recently, here at our research lab, we have seen an increase in the number of JS/Chromex.Submelius threats detected, says Camilo Gutiérrez Amaya.

Camilo Gutiérrez Amaya28 Apr 2017


Is cybersecurity now as important as health and safety?

Is cybersecurity now as important as health and safety?

Is cybersecurity now as important as health and safety?

World Day for Safety and Health at Work takes place on April 28th 2017. You should use this as an opportunity to improve your cybersecurity posture.

Editor28 Apr 2017


Young duo sentenced over role in TalkTalk data breach

Young duo sentenced over role in TalkTalk data breach

Young duo sentenced over role in TalkTalk data breach

Two men are facing a prison sentence after admitting their part in the recent TalkTalk data breach.

Editor28 Apr 2017


Healthcare providers ‘cannot be complacent over data security’

Healthcare providers ‘cannot be complacent over data security’

Healthcare providers ‘cannot be complacent over data security’

Consumers have placed a high level of trust in healthcare organizations to keep their data safe, but companies cannot afford to take this for granted.

Editor27 Apr 2017


Hack the US Air Force, and make cash... legally!

Hack the US Air Force, and make cash... legally!

Hack the US Air Force, and make cash... legally!

Humans make mistakes, and vulnerabilities can creep into projects unspotted. The more trusted eyes checking a service - with the approval of the systems' owners - the better.

Graham Cluley27 Apr 2017


Apt Activity Report
MDR Protection