Categories

Articles

 A quick introduction to web security

A web developer’s primer on CORS, CSP, HSTS, and all the web security acronyms!   Photo by Jose Fontano on Unsplash There are many reasons to learn about web security: You’re a...

 ATM malware offered for $5000 at DarkNet !

Wannabe crooks can buy an ATM malware on a Darknet market for around $5000, the discovery was made by researchers at Kaspersky Lab that noticed a forum post advertising the malicious code dubbed...

 After the GDPR Comes ePrivacy

  Photo Courtesy of Pixabay The European Union (EU) has always strived to unify the legal coverage of the citizens of its Member States and to amalgamate the laws in which they...

 Backup and recovery means you can say no to ransom demands

Ransomware continues to be a huge problem for companies and consumers—and a major source of income for cybercriminals. Malicious hackers using CryptoWall ransomware extorted $18 million last year,...

 CCleaner - Hacked

Users of Avast-owned security application CCleaner for Windows have been advised to update their software immediately, after researchers discovered criminal hackers had installed a backdoor in...

 Cloudflare: Announcing Firewall Rules

Threat landscapes change every second. As attackers evolve, becoming more dynamic and devious, vulnerabilities materialize faster than engineers can patch their applications. Part of Cloudflare’s...

 Data Protection Officer (Cyprus)

Ο Υπεύθυνος Προστασίας Δεδομένων (ΥΠΔ) είναι υπεύθυνος για την παρακολούθηση της συμμόρφωσης με τον Κανονισμό εντός του Οργανισμού. Ο ρόλος του είναι συμβουλευτικός. Τα κύρια καθήκοντα του είναι να...

 Disappearing Data: WHOIS Blackout will likely start May 25, 2018

WHOIS, a protocol used to query databases for domain name ownership information, will likely be widely unavailable while the Internet Corporation for Assigned Names and Numbers (ICANN) works on...

 Email consent under GDPR

With the General Data Protection Regulation (GDPR), the European Union’s new privacy law, coming into effect on May 25th, 2018, now is the time for email marketers to ensure that their programs are...

 FBI wants private firms and government organizations to stop using Kaspersky

The FBI’s intention is to have U.S. firms remove Kaspersky out of their PC’s as early as possible or avoid from utilizing them in new Machines or other efforts, the new and former officials say....

 FBI: "Extortion And CEO Fraud Are The Top Online Fraud Complaints"

nd victims aren't reporting ransomware attacks... Online extortion, tech support scams and phishing attacks that spoof the boss (CEO Fraud) were among the most damaging and expensive scams...

 Facebook 50 millions users hacked

Some users are reporting that they are unable to post today’s big story about a security breach affecting 50 million Facebook users. The issue appears to only affect particular stories from...

 Facebook is one of the "Why's" we need a Data Protection Agency

ILLUSTRATION: SALLY THURER FOR BLOOMBERG BUSINESSWEEK Over and over in the last 20 years we’ve watched low-cost or free internet communications platforms spring from the good intentions or...

 Free Wi-Fi Cybersecurity tips

Free Wi-Fi is awesome, no doubts here. But public networks hide numerous hazards, including even the risk of losing all the funds in your bank account. Bright Side collected the most crucial...

 GDPR - Greek

Ο κανονισμός για την προστασία των δεδομένων καθορίζει τα δικαιώματα των φυσικών προσώπων, καθώς και τις υποχρεώσεις των προσώπων που επεξεργάζονται και εκείνων που είναι υπεύθυνα για την...

 GDPR: 15 (good & bad) examples of repermissioning emails & campaigns

By now, you've probably received at least one email from a company asking you to confirm that you really do want to receive marketing emails. These repermissioning campaigns are an attempt to...

 Global Study - Application Intelligence Report

ANALYZING THE RELATIONSHIP BETWEEN HUMAN BEHAVIOR, SECURITY AND THE APPLICATIONS THAT DRIVE US  The world’s casual approach to applications, device use and digital behavior is introducing new...

 Got "Russia = BadGuys" Fatigue Yet? They Just Phished a Nuclear Site

A report from the FBI and the US Department of Homeland Security warns of malware attacks targeting mainly nuclear power stations, and energy facilities. The attacks started May this year....

 How computers and internet work

How do computers and the internet work? - Computer Science Basics   Have you ever wondered how computers or the internet really work? In this video, Briana Marie explains the basics of...

 How to encrypt your online life in less than an hour !

“Only the paranoid survive.” — Andy Grove Andy Grove was a Hungarian refugee who escaped communism, studied engineering, and ultimately led the personal computer revolution as the CEO of Intel. He...

 Is your WordPress website secure?

Whenever we talk about WordPress and security, it’s important to address one question right off the bat. How secure is WordPress? The answer is, WordPress is one of the most secure web publishing...

 Is your WordPress, GDPR ready? Here are some easy tips for you !

What is GDPR? The GDPR website states "​The aim of the GDPR is to protect all EU citizens from privacy and data breaches in an increasingly data-driven world." Protecting private data is...

 Is your website GDPR ready? Risk breaching data and pay up to €20 Million?

Source — https://www.eugdpr.org/eugdpr.org.html I have been reading about General Data Protection Regulation (GDPR) for more than a year now. Until now I have gone through various articles...

 Keeping WordPress up to date

As of Version 3.7, WordPress ships with automatic maintenance and security updates. That means if you have a live WordPress site on the web, and a new maintenance and security update comes out,...

 Learn how Mobile AST is different from traditional AST and is pervading the enterprise in this research from Gartner

This “must-read” guide for application security and risk management professionals provides recommendations for instituting or improving mobile app security testing at the enterprise. Download the...

 Limit WordPress Admin access

You already know that when you set up your WordPress site, the account that you set up for the WordPress site is an Administrator account, and anytime you log in with an Administrator account, you...

 Maliciously Mobile: A Brief History of Mobile Malware

Threat Intel’s ‘History of…’ series will look at the origins and evolution of notable developments in cyber security.   It’s difficult to remember a time when you could sit in a café where...

 Malvertising: Technological or Psychological Warfare?

Cyber criminals are using modern-day online advertising techniques to target end users, mess with their minds, and infect their computers with malware. Seemingly-harmless adverts now host today's...

 New Fileless, Code-Injecting Ransomware Bypasses Antivirus

Security researchers have discovered a new fileless ransomware in the wild, which injects malicious code into a legitimate system process (svchost.exe) on a targeted system and then self-destructs...

 New Massive Wave of CryptoLocker Ransomware Infections

We all thought that evil genius Evgeniy Bogachev had retired at the Black Sea with his tens of millions of ill-gotten gains after he became the FBI's #1 Most Wanted cybercriminal. Well, perhaps he...

 Opt-out fitness data sharing leads to massive military locations leak

People who exercise with fitness trackers have a digital record of their workouts. They do it for a wide range of reasons, from gathering serious medical data to simply satisfying curiosity. When...

 Prioritizing Threats with Real-Time Threat Intelligence

    Editor’s Note: The following blog post is a partial summary of our customer webinar featuring Greg Reith, threat intelligence analyst at T-Mobile. Key Takeaways The role of threat...

 Ransomware Apocalypse: WannaCrypt Is the the Largest Virus Attack in History

The extortion virus called WannaCrypt has infected tens of thousands of computers around the world. It has paralyzed the work of British hospitals and Spanish companies, and then made its way to...

 Ransomware Now Hits Linux - Web Hosting Provider Pays a Million

South Korean web hosting company Nayana agreed to pay $1 million in Bitcoin after a ransomware attack hit 153 Linux servers. The attack took place June 10 and resulted in over 3,400 business...

 Scam of the Week: Phishing Moves to Smishing

Internet bad guys are increasingly trying to circumvent your spam filters and instead are targeting your users directly through their smartphone with smishing attacks, which are hard to stop.The...

 Scam of the Week: Real Estate Wire Transfer Phishing Fraud

According to the NY Daily News, State Supreme Court Justice Lori Sattler was in the process of selling her apartment and buying another, when she received an email that seemed like it was coming...

 The Recorded Future Blog: Going Dark: Fact vs. Fiction on the Dark Web

Mention the dark web and many people summon imagery of a massive, mysterious online criminal underground, where all manner of products and information are bought, sold, and traded, hidden away from...

 The Sophistication of Organized Cybercriminals

  Cybercriminals know no bounds and will stop at nothing to steal your data using advanced sophistication and organizational skills. Organized Cybercriminals use many methods to...

 This Phishing Attack is Almost Impossible to Detect On Chrome, Firefox and Opera

A Chinese infosec researcher has reported about an "almost impossible to detect" phishing attack that can be used to trick even the most careful users on the Internet.He warned, hackers can...

 Thousands of telnet credentials has been published online

Security researchers have discovered a list of thousands of Telnet credentials that enables anyone on the Internet to take control over home routers. “Telnet is a protocol used on the Internet...

 Website Security Myths by Cloudflare

Photo by MILKOVÍ / Unsplash   Some conversations are easy; some are difficult. Some are harmonious and some are laborious. But when it comes to website security, the conversation is...

 What is like to work in Cybersecurity field?

What is it like to work in cyber security? We ask some of the members of the team in Symantec. Today, we hear from Candid Wüest, a Principal Threat Researcher based in Switzerland.   Cyber...

 Why are we still pretending e-mail is secure?

We have a serious problem, and it just buzzed in your pocket.   We are addicted to non-stop communication, and it’s damaging our democracy and our daily lives....

 Windows 10 Stops Ransomware Cold? Not So Fast!

Recently, Microsoft claimed that no known ransomware could penetrate the new Win10 Creators Update. Presenting new anti-ransomware protection features added in Win 10 CU, Robert Lefferts, Director...

 WordPress backups and logins

Backing up WordPress An important part of data security, whether it be your own data on a computer, on an external drive, on a disk, or in this case, a website running WordPress on the web, is to...

 Working in Cyber Security: “Cyber security gave me the chance to see the world”

What is it like to work in cyber security? We ask some of the members of the team in Symantec. Today, we hear from Sayali Kulkarni, Senior Threat Analysis Engineer.   How long have you been...

 Working in Cyber Security: “Do not limit yourself to what your professor or boss instructs you to do”

What is it like to work in cyber security? We ask some of the members of the team in Symantec. Today, we hear from Torrey Umland, Leader of Engineers.   A leader should never be in their...

 Working in Cyber Security: “You need to have confidence in yourself”

What is it like to work in cyber security? We ask some of the members of the team in Symantec. Today, we hear from Aishwarya Lonkar, a Threat Analysis Engineer based in Pune, India.   How...

 Working in Cybersecurity : No two jobs are the same

There are many different job opportunities in cyber security companies, and not all are strictly technical. Today we hear from two people working in different roles in Symantec: a Scrum Master...

 You have probably been hijacked to mine cryptocurrency. They are using you...

The recent surge in cryptocurrency prices could give website administrators a new way to monetize and allow them to get rid of annoying banner ads. This potentially less...

 Your Wi-Fi is vulnerable ! Easy to crack with #krackattacks

A newly discovered flaw in the widely used Wi-Fi encryption protocol – WPA2 – could leave millions of users vulnerable to attacks, prompting warnings Monday from the US government and security...

 Your website SEO attack

Haters gonna hate, as the saying goes. SEO is no exception. If you’re ranking well for in-demand keywords, you can expect to be the target of a number of negative SEO campaigns trying to tear...