Latest Articles

Scams

FBI warns of email scams claiming to be from Bureau

FBI warns of email scams claiming to be from Bureau

Scams

FBI warns of email scams claiming to be from Bureau

Another template attempts to scare, rather than thrill, the recipients. Upon learning that “your IP address and other identifying information were used to commit multiple online crimes”, the mark is urged to contact the sender by phone immediately.

Tomáš Foltýn06 Feb 2018


How To, Mobile Security

Think you have a tracker on your phone? Learn how to make your device more resilient

Think you have a tracker on your phone? Learn how to make your device more resilient

How To, Mobile Security

Think you have a tracker on your phone? Learn how to make your device more resilient

While it certainly doesn’t hurt to ask for help from local law enforcement, know that even major cities may not have the expertise or the bandwidth to investigate compromised mobile devices. The most important objective is to take steps to make sure you’re safe. Ask for help, but do not wait for others to help you.

Lysa Myers06 Feb 2018


Vulnerabilities reached a historic peak in 2017

Vulnerabilities reached a historic peak in 2017

Vulnerabilities reached a historic peak in 2017

In 2017, the number of vulnerabilities smashed records set in previous years. According to CVE Details, more than 14,600 vulnerabilities were reported in 2017, compared to 6447 in 2016.

Miguel Ángel Mendoza05 Feb 2018


Digital Security

Smart, Smarter… Dumbest…

Smart, Smarter… Dumbest…

Digital Security

Smart, Smarter… Dumbest…

While the evolution of new smartphones creates more possibilities for the user, these new devices also creates more possibilities for hackers.

Righard Zwienenberg02 Feb 2018


Google smashed over 700,000 bad Android apps last year

Google smashed over 700,000 bad Android apps last year

Google smashed over 700,000 bad Android apps last year

Google says that it is getting better than ever at protecting Android users against bad apps and malicious developers.

Graham Cluley31 Jan 2018


Privacy

Privacy of fitness tracking apps in the spotlight after soldiers' exercise routes shared online

Privacy of fitness tracking apps in the spotlight after soldiers' exercise routes shared online

Privacy

Privacy of fitness tracking apps in the spotlight after soldiers' exercise routes shared online

People exercising on far-flung military bases are being exposed by their fitness tracker.

Graham Cluley30 Jan 2018


Digital Security

Babies’ personal data hawked on dark web

Babies’ personal data hawked on dark web

Digital Security

Babies’ personal data hawked on dark web

The price puts the data records at a significant premium when compared to other stolen datasets. While, in general, many adverts in the dark recesses of the internet are fake, children’s personally identifiable information (PII) has for long been viewed as a particularly valuable commodity.

Tomáš Foltýn26 Jan 2018


Ransomware

FriedEx: BitPaymer ransomware the work of Dridex authors

FriedEx: BitPaymer ransomware the work of Dridex authors

Ransomware

FriedEx: BitPaymer ransomware the work of Dridex authors

ESET research has found that the ransomware FriedEx, also known as BitPaymer, is actually the work of the notorious gang responsible for the Dridex banking trojan.

Michal Poslušný26 Jan 2018


Cybercrime

Jail for man who hacked 1000 student email accounts in search for sexually explicit images

Jail for man who hacked 1000 student email accounts in search for sexually explicit images

Cybercrime

Jail for man who hacked 1000 student email accounts in search for sexually explicit images

A poorly-secured password reset utility allowed a man to access more than 1,000 email accounts at a New York City-area university in a hunt for sexually explicit photographs and videos.

Graham Cluley26 Jan 2018


Secure Coding

How well can bug hunting pay?

How well can bug hunting pay?

Secure Coding

How well can bug hunting pay?

In some countries, the financial allure of looking for security vulnerabilities is (even) more striking, according to the findings of a survey released recently by bug bounty platform provider HackerOne.

Tomáš Foltýn25 Jan 2018


Privacy

Data Privacy vs. Data Protection: Reflecting on Privacy Day and GDPR

Data Privacy vs. Data Protection: Reflecting on Privacy Day and GDPR

Privacy

Data Privacy vs. Data Protection: Reflecting on Privacy Day and GDPR

Data privacy is also a topic that can spark big debates, like the one between the US and the EU as to what protections should be accorded to data pertaining to people, specifically by those who collect, control, or process such data.

Stephen Cobb25 Jan 2018


Digital Security

10 Linux distributions recommended for 2018

10 Linux distributions recommended for 2018

Digital Security

10 Linux distributions recommended for 2018

The new features included all the patches, fixes, and updates to the tools and Kernel that were released over the preceding period, which is no small matter, especially if you use Maltego or SET.

Lucas Paus24 Jan 2018


Threat Report
MSP Program