Information security policy can make a big difference for small business. Here we offer advice, resources, and a free recorded webinar on the subject to help your small firm beat the bad guys, and the competition.
Search results for: "Google Play "
Apple users may soon be able not only to unlock their devices simply by showing their face - they may be able to “control” functions on Macs, iPhones and iPads simply by looking at the screen, and prevent people nearby snooping on lock screen alerts.
News of the NSA's mass electronic surveillance is having a negative impact on consumer sentiment toward online technology and tech companies, according to recent survey that suggests it could hurt GDP and corporate profits.
Major companies such as Disney, Boeing and General Electric are still handing out information to “hackers” using the most basic tool of all - the human voice, according to a report on a competition at DefCon.
[Update 30th October 2013: with regard to the ping gambit discussed below, please note that protection.com now responds to ICMP echo requests – in other words, if you now run the command “ping protection.com” you should now see a screen something like this: Note that this is perfectly normal behaviour for a site that responds
President Obama’s Twitter and Facebook accounts were briefly compromised this week - with two Tweets and one post altered to send links to video montages of terrorist attacks.
Ransomware can be among the most frightening forms of malware - suddenly, your screen is replaced by a message from the police, demanding money, or a message saying your files are lost unless you pay a ransom to unlock them. Our tips will help you fight back.
We have already discussed how a system gets infected with Win32/Nymaim ransomware. In this blog post, we reveal a new infection vector, a study of the different international locker designs and ransom prices as well as a complete technical analysis of its communication protocol.
In this blog post, we will describe software detected by ESET products as Win32/Kankan, and explain why its discovery shocked many Chinese users, then we will provide an in-depth analysis of its functionalities - and discuss the evidence that Xunlei Networking Technologies is implicated.
A trio of men plugged keyloggers disguised as ordinary connectors into cash registers in a Nordstrom department store in Florida, and returned to collect days later, according to security blogger Brian Krebs.
Malware, phishing and ID thieves are everywhere - but you don’t have to be paranoid, or hang back, or stop yourself enjoying the best the web has to offer. Our tips should help you browse with confidence.
These days cybercriminals will use phone calls, SMS messages, emails, fake apps - and even couriers - in an effort to get your money. The key to staying safe is to recognize behavior that isn’t quite “right” - and catch phishers and fraudsters in the act.
In this 3rd Hesperbot blog post we’ll look at the most intriguing part of the malware - the way it handles network traffic interception.
Phishing emails are a sad fact of life, and most of us are used to dealing with them - but cybercriminals are increasingly turning to SMS to reel in their victims. Our tips should help you avoid clicking something you'll regret.
The website of the New York Times briefly disappeared this week, replaced by a banner saying, “Hacked by Syrian Electronic Army" - victim of an attack described as "sophisticated". Twitter and the Huffington Post were also briefly affected.
A few months ago on this blog I described PowerLoader functionality - including an interesting way for privilege escalation into the explorer.exe system process. The leaked PowerLoader code is also used in other malware families.
The New York Post has become the latest victim of a prolific hacking campaign targeting the social media accounts of worldwide media outlets - and SocialFlow, a social media company used by the Post and other media outlets, has also fallen victim.
Two video plug-ins for YouTube hijack users visits to the site and insert extra adverts - some of which are being hijacked by “malvertisers”, sending users to fake adverts which attempt to infect their PCs.
A security flaw has left all Android Bitcoin wallets vulnerable to theft, Bitcoin.org has warned. The vulnerability affects all Bitcoin wallets on the Android plaform.
The German developer of the hit shoot ‘em up series Crysis has taken its websites offline after a security breach in which user login details “may have been compromised.”