Knowledgebase

Categories

Articles

A web developer’s primer on CORS, CSP, HSTS, and all the web security acronyms!   Photo by Jose Fontano on Unsplash There are many reasons to learn about web security: You’re a concerned user that is...

Wannabe crooks can buy an ATM malware on a Darknet market for around $5000, the discovery was made by researchers at Kaspersky Lab that noticed a forum post advertising the malicious code dubbed Cutlet Maker. “In May...

  Photo Courtesy of Pixabay The European Union (EU) has always strived to unify the legal coverage of the citizens of its Member States and to amalgamate the laws in which they operate. Many aspects...

Ransomware continues to be a huge problem for companies and consumers—and a major source of income for cybercriminals. Malicious hackers using CryptoWall ransomware extorted $18 million last year, according to the FBI,...

    Photo by Vijay Putra from Pexels Enterprise cyberattacks are growing more frequent, sophisticated, destructive, and costly, alarming global investors and c-suite executives alike. PwC’s 2018 Global...

Users of Avast-owned security application CCleaner for Windows have been advised to update their software immediately, after researchers discovered criminal hackers had installed a backdoor in the tool. The tainted...

Threat landscapes change every second. As attackers evolve, becoming more dynamic and devious, vulnerabilities materialize faster than engineers can patch their applications. Part of Cloudflare’s mission is to keep...

This is a guest post coordinated by Rebecca Nehme who works for Thales’ Cybersecurity program based at STATION F. You know grandparents who want to learn more about other tech topics? Follow our Medium keyword «...

Ο Υπεύθυνος Προστασίας Δεδομένων (ΥΠΔ) είναι υπεύθυνος για την παρακολούθηση της συμμόρφωσης με τον Κανονισμό εντός του Οργανισμού. Ο ρόλος του είναι συμβουλευτικός. Τα κύρια καθήκοντα του είναι να ενημερώνει τον...

WHOIS, a protocol used to query databases for domain name ownership information, will likely be widely unavailable while the Internet Corporation for Assigned Names and Numbers (ICANN) works on adopting an interim...

With the General Data Protection Regulation (GDPR), the European Union’s new privacy law, coming into effect on May 25th, 2018, now is the time for email marketers to ensure that their programs are compliant. (Not sure...

Previously, we posted a proposal to mark all HTTP pages as definitively “not secure” and remove secure indicators for HTTPS pages. HTTPS usage on the web has taken off as we’ve evolved Chrome security indicators. Later...

The FBI’s intention is to have U.S. firms remove Kaspersky out of their PC’s as early as possible or avoid from utilizing them in new Machines or other efforts, the new and former officials say. The FBI’s...

nd victims aren't reporting ransomware attacks... Online extortion, tech support scams and phishing attacks that spoof the boss (CEO Fraud) were among the most damaging and expensive scams according to new figures from...

Some users are reporting that they are unable to post today’s big story about a security breach affecting 50 million Facebook users. The issue appears to only affect particular stories from certain outlets, at this...

ILLUSTRATION: SALLY THURER FOR BLOOMBERG BUSINESSWEEK Over and over in the last 20 years we’ve watched low-cost or free internet communications platforms spring from the good intentions or social curiosity of...

Free Wi-Fi is awesome, no doubts here. But public networks hide numerous hazards, including even the risk of losing all the funds in your bank account. Bright Side collected the most crucial tips to ensure you never...

Ο κανονισμός για την προστασία των δεδομένων καθορίζει τα δικαιώματα των φυσικών προσώπων, καθώς και τις υποχρεώσεις των προσώπων που επεξεργάζονται και εκείνων που είναι υπεύθυνα για την επεξεργασία των δεδομένων....

By now, you've probably received at least one email from a company asking you to confirm that you really do want to receive marketing emails. These repermissioning campaigns are an attempt to bring consent up to the...

ANALYZING THE RELATIONSHIP BETWEEN HUMAN BEHAVIOR, SECURITY AND THE APPLICATIONS THAT DRIVE US  The world’s casual approach to applications, device use and digital behavior is introducing new vulnerabilities for...

A report from the FBI and the US Department of Homeland Security warns of malware attacks targeting mainly nuclear power stations, and energy facilities. The attacks started May this year.   These attacks are getting...

  Hackers at work “Playfully doing something difficult, whether useful or not, that is hacking.” ~ Richard Stallman There is a very distorted image regarding hackers and hacking among the general...

How do computers and the internet work? - Computer Science Basics   Have you ever wondered how computers or the internet really work? In this video, Briana Marie explains the basics of computer hardware, software,...

“Only the paranoid survive.” — Andy Grove Andy Grove was a Hungarian refugee who escaped communism, studied engineering, and ultimately led the personal computer revolution as the CEO of Intel. He died earlier this...

      Jammie Thomas-Rasset always claimed she hadn’t heard of Kazaa until her trial, and that it must have been her boyfriend or her kids who illegally shared...

Whenever we talk about WordPress and security, it’s important to address one question right off the bat. How secure is WordPress? The answer is, WordPress is one of the most secure web publishing applications available,...

What is GDPR? The GDPR website states "​The aim of the GDPR is to protect all EU citizens from privacy and data breaches in an increasingly data-driven world." Protecting private data is something we are passionate...

Source — https://www.eugdpr.org/eugdpr.org.html I have been reading about General Data Protection Regulation (GDPR) for more than a year now. Until now I have gone through various articles about GDPR and the...

As of Version 3.7, WordPress ships with automatic maintenance and security updates. That means if you have a live WordPress site on the web, and a new maintenance and security update comes out, let’s say 3.9.2, then...

This “must-read” guide for application security and risk management professionals provides recommendations for instituting or improving mobile app security testing at the enterprise. Download the guide to learn: How...

You already know that when you set up your WordPress site, the account that you set up for the WordPress site is an Administrator account, and anytime you log in with an Administrator account, you have complete control...

Threat Intel’s ‘History of…’ series will look at the origins and evolution of notable developments in cyber security.   It’s difficult to remember a time when you could sit in a café where people were having...

Cyber criminals are using modern-day online advertising techniques to target end users, mess with their minds, and infect their computers with malware. Seemingly-harmless adverts now host today's most nefarious malware...

Status Report From: NASA HQ Posted: Tuesday, December 18, 2018 Potential PII Compromise of NASA Servers Bob Gibbs, Assistant Administrator, Office of the Chief Human Capital Officer Tuesday, December 18, 2018...

Security researchers have discovered a new fileless ransomware in the wild, which injects malicious code into a legitimate system process (svchost.exe) on a targeted system and then self-destructs itself in order to...

We all thought that evil genius Evgeniy Bogachev had retired at the Black Sea with his tens of millions of ill-gotten gains after he became the FBI's #1 Most Wanted cybercriminal. Well, perhaps he ran out of...

Are You Ready for the California Consumer Privacy Act?   California has introduced its own version of the General Data Protection Regulation (GDPR) called the California Consumer Privacy Act (CCPA)....

People who exercise with fitness trackers have a digital record of their workouts. They do it for a wide range of reasons, from gathering serious medical data to simply satisfying curiosity. When fitness data includes...

    Editor’s Note: The following blog post is a partial summary of our customer webinar featuring Greg Reith, threat intelligence analyst at T-Mobile. Key Takeaways The role of threat intelligence is to...

The extortion virus called WannaCrypt has infected tens of thousands of computers around the world. It has paralyzed the work of British hospitals and Spanish companies, and then made its way to Russia, attacking the...

South Korean web hosting company Nayana agreed to pay $1 million in Bitcoin after a ransomware attack hit 153 Linux servers. The attack took place June 10 and resulted in over 3,400 business websites the company hosts...

Internet bad guys are increasingly trying to circumvent your spam filters and instead are targeting your users directly through their smartphone with smishing attacks, which are hard to stop.The practice has been around...

According to the NY Daily News, State Supreme Court Justice Lori Sattler was in the process of selling her apartment and buying another, when she received an email that seemed like it was coming from her lawyer.The...

Enterprises are increasingly aware of the need to protect their systems and users from cyberattack. This is a good thing, as it indicates a growing awareness of security risks, no doubt underpinned by the never-ending...

(Sequel here: Blockchain is not only crappy technology but a bad vision for the future.) Everyone says the blockchain, the technology underpinning cryptocurrencies such as bitcoin, is going to change EVERYTHING. And...

Mention the dark web and many people summon imagery of a massive, mysterious online criminal underground, where all manner of products and information are bought, sold, and traded, hidden away from the prying eyes of...

  Cybercriminals know no bounds and will stop at nothing to steal your data using advanced sophistication and organizational skills. Organized Cybercriminals use many methods to compromise the defenses...

A Chinese infosec researcher has reported about an "almost impossible to detect" phishing attack that can be used to trick even the most careful users on the Internet.He warned, hackers can use a known...

Security researchers have discovered a list of thousands of Telnet credentials that enables anyone on the Internet to take control over home routers. “Telnet is a protocol used on the Internet or local area networks...

5 most important vulnerabilities every developer should be aware of   It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it. — Stephane Nappo Who am I? I‘m a full stack...

Photo by MILKOVÍ / Unsplash   Some conversations are easy; some are difficult. Some are harmonious and some are laborious. But when it comes to website security, the conversation is confusing. Every organisation...

What is it like to work in cyber security? We ask some of the members of the team in Symantec. Today, we hear from Candid Wüest, a Principal Threat Researcher based in Switzerland.   Cyber security professionals...

We have a serious problem, and it just buzzed in your pocket.   We are addicted to non-stop communication, and it’s damaging our democracy and our daily lives. We are shocked when...

Recently, Microsoft claimed that no known ransomware could penetrate the new Win10 Creators Update. Presenting new anti-ransomware protection features added in Win 10 CU, Robert Lefferts, Director of Program...

Backing up WordPress An important part of data security, whether it be your own data on a computer, on an external drive, on a disk, or in this case, a website running WordPress on the web, is to have a proper backup...

What is it like to work in cyber security? We ask some of the members of the team in Symantec. Today, we hear from Sayali Kulkarni, Senior Threat Analysis Engineer.   How long have you been in this role? I have...

What is it like to work in cyber security? We ask some of the members of the team in Symantec. Today, we hear from Torrey Umland, Leader of Engineers.   A leader should never be in their team’s way. Stock photo....

What is it like to work in cyber security? We ask some of the members of the team in Symantec. Today, we hear from Aishwarya Lonkar, a Threat Analysis Engineer based in Pune, India.   How long have you been in...

There are many different job opportunities in cyber security companies, and not all are strictly technical. Today we hear from two people working in different roles in Symantec: a Scrum Master and a Director of...

The recent surge in cryptocurrency prices could give website administrators a new way to monetize and allow them to get rid of annoying banner ads. This potentially less intrusive revenue...

A newly discovered flaw in the widely used Wi-Fi encryption protocol – WPA2 – could leave millions of users vulnerable to attacks, prompting warnings Monday from the US government and security researchers worldwide....

Haters gonna hate, as the saying goes. SEO is no exception. If you’re ranking well for in-demand keywords, you can expect to be the target of a number of negative SEO campaigns trying to tear you down a peg or two....