A quick introduction to web security A web developer’s primer on CORS, CSP, HSTS, and all the web security acronyms!   Photo... ATM malware offered for $5000 at DarkNet ! Wannabe crooks can buy an ATM malware on a Darknet market for around $5000, the discovery was... After the GDPR Comes ePrivacy   Photo Courtesy of Pixabay The European Union (EU) has always strived to... Backup and recovery means you can say no to ransom demands Ransomware continues to be a huge problem for companies and consumers—and a major source of... Business Cyber Threats 2019     Photo by Vijay Putra from Pexels Enterprise cyberattacks are growing more... CCleaner - Hacked Users of Avast-owned security application CCleaner for Windows have been advised to update... Cloudflare: Announcing Firewall Rules Threat landscapes change every second. As attackers evolve, becoming more dynamic and devious,... Cybersecurity explained to your grandparents This is a guest post coordinated by Rebecca Nehme who works for Thales’ Cybersecurity program... DDoS Attacks & Response   Distributed Denial of Service (DDoS) attacks aim to take an organization or service offline... Data Privacy 2021 Tips   There’s no doubt that the internet has changed our lives in countless positive ways, but... Data Protection Officer (Cyprus) Ο Υπεύθυνος Προστασίας Δεδομένων (ΥΠΔ) είναι υπεύθυνος για την παρακολούθηση της συμμόρφωσης με... Disappearing Data: WHOIS Blackout will likely start May 25, 2018 WHOIS, a protocol used to query databases for domain name ownership information, will likely be... Email consent under GDPR With the General Data Protection Regulation (GDPR), the European Union’s new privacy law, coming... Evolving Chrome's security indicators Previously, we posted a proposal to mark all HTTP pages as definitively “not secure” and remove... FBI wants private firms and government organizations to stop using Kaspersky The FBI’s intention is to have U.S. firms remove Kaspersky out of their PC’s as early as possible... FBI: "Extortion And CEO Fraud Are The Top Online Fraud Complaints" nd victims aren't reporting ransomware attacks... Online extortion, tech support scams and... Facebook 50 millions users hacked Some users are reporting that they are unable to post today’s big story about a security... Facebook is one of the "Why's" we need a Data Protection Agency ILLUSTRATION: SALLY THURER FOR BLOOMBERG BUSINESSWEEK Over and over in the last 20 years... Free Wi-Fi Cybersecurity tips Free Wi-Fi is awesome, no doubts here. But public networks hide numerous hazards, including... GDPR - Greek Ο κανονισμός για την προστασία των δεδομένων καθορίζει τα δικαιώματα των φυσικών προσώπων,... GDPR: 15 (good & bad) examples of repermissioning emails & campaigns By now, you've probably received at least one email from a company asking you to confirm that you... Global Study - Application Intelligence Report ANALYZING THE RELATIONSHIP BETWEEN HUMAN BEHAVIOR, SECURITY AND THE APPLICATIONS THAT DRIVE US... Got "Russia = BadGuys" Fatigue Yet? They Just Phished a Nuclear Site A report from the FBI and the US Department of Homeland Security warns of malware attacks... Hacker's world   Hackers at work “Playfully doing something difficult, whether useful or not,... How computers and internet work How do computers and the internet work? - Computer Science Basics   Have you ever wondered... How to encrypt your online life in less than an hour ! “Only the paranoid survive.” — Andy Grove Andy Grove was a Hungarian refugee who escaped... Internet Regulation Can Go Really Wrong       Jammie Thomas-Rasset always... Is your WordPress website secure? Whenever we talk about WordPress and security, it’s important to address one question right off... Is your WordPress, GDPR ready? Here are some easy tips for you ! What is GDPR? The GDPR website states "​The aim of the GDPR is to protect all EU citizens from... Is your website GDPR ready? Risk breaching data and pay up to €20 Million? Source — I have been reading about General Data... Keeping WordPress up to date As of Version 3.7, WordPress ships with automatic maintenance and security updates. That means if... Learn how Mobile AST is different from traditional AST and is pervading the enterprise in this research from Gartner This “must-read” guide for application security and risk management professionals provides... Limit WordPress Admin access You already know that when you set up your WordPress site, the account that you set up for the... Maliciously Mobile: A Brief History of Mobile Malware Threat Intel’s ‘History of…’ series will look at the origins and evolution of notable... Malvertising: Technological or Psychological Warfare? Cyber criminals are using modern-day online advertising techniques to target end users, mess with... Nasa Data Breach 2018 Status Report From: NASA HQ Posted: Tuesday, December 18, 2018 Potential PII Compromise of NASA... New Fileless, Code-Injecting Ransomware Bypasses Antivirus Security researchers have discovered a new fileless ransomware in the wild, which injects... New Massive Wave of CryptoLocker Ransomware Infections We all thought that evil genius Evgeniy Bogachev had retired at the Black Sea with his tens of... New Regulation - California Consumer Privacy Act (CCPA) Are You Ready for the California Consumer Privacy Act?   California has... Opt-out fitness data sharing leads to massive military locations leak People who exercise with fitness trackers have a digital record of their workouts. They do it... Prioritizing Threats with Real-Time Threat Intelligence     Editor’s Note: The following blog post is a partial summary of our customer webinar... Ransomware Apocalypse: WannaCrypt Is the the Largest Virus Attack in History The extortion virus called WannaCrypt has infected tens of thousands of computers around the... Ransomware Now Hits Linux - Web Hosting Provider Pays a Million South Korean web hosting company Nayana agreed to pay $1 million in Bitcoin after a ransomware... Romance Scams Imagine someone in your life — a parent, a sibling or a close friend — has found love after... Scam of the Week: Phishing Moves to Smishing Internet bad guys are increasingly trying to circumvent your spam filters and instead are... Scam of the Week: Real Estate Wire Transfer Phishing Fraud According to the NY Daily News, State Supreme Court Justice Lori Sattler was in the process of... Secure your data to effectively reduce your business risk Enterprises are increasingly aware of the need to protect their systems and users from... Ten years in, nobody has come up with a use for blockchain (Sequel here: Blockchain is not only crappy technology but a bad vision for the future.)... The Recorded Future Blog: Going Dark: Fact vs. Fiction on the Dark Web Mention the dark web and many people summon imagery of a massive, mysterious online criminal... The Sophistication of Organized Cybercriminals   Cybercriminals know no bounds and will stop at nothing to steal your data using... This Phishing Attack is Almost Impossible to Detect On Chrome, Firefox and Opera A Chinese infosec researcher has reported about an "almost impossible to detect" phishing... Thousands of telnet credentials has been published online Security researchers have discovered a list of thousands of Telnet credentials that enables... Top 5 vulnerabilities 5 most important vulnerabilities every developer should be aware of   It takes 20... Website Security Myths by Cloudflare Photo by MILKOVÍ / Unsplash   Some conversations are easy; some are difficult. Some are... What is like to work in Cybersecurity field? What is it like to work in cyber security? We ask some of the members of the team in Symantec.... White, Grey, Black, Green, Blue, and Red Hat Hackers Explained Welcome to the movies, everyone! Have you ever heard the term white hat or black hat hacker,... Why are we still pretending e-mail is secure? We have a serious problem, and it just buzzed in your pocket.... Windows 10 Stops Ransomware Cold? Not So Fast! Recently, Microsoft claimed that no known ransomware could penetrate the new Win10 Creators... WordPress backups and logins Backing up WordPress An important part of data security, whether it be your own data on a... Working in Cyber Security: “Cyber security gave me the chance to see the world” What is it like to work in cyber security? We ask some of the members of the team in Symantec.... Working in Cyber Security: “Do not limit yourself to what your professor or boss instructs you to do” What is it like to work in cyber security? We ask some of the members of the team in Symantec.... Working in Cyber Security: “You need to have confidence in yourself” What is it like to work in cyber security? We ask some of the members of the team in Symantec.... Working in Cybersecurity : No two jobs are the same There are many different job opportunities in cyber security companies, and not all are... You have probably been hijacked to mine cryptocurrency. They are using you... The recent surge in cryptocurrency prices could give website... Your Wi-Fi is vulnerable ! Easy to crack with #krackattacks A newly discovered flaw in the widely used Wi-Fi encryption protocol – WPA2 – could leave... Your website SEO attack Haters gonna hate, as the saying goes. SEO is no exception. If you’re ranking well for...