Archive

Archive

#SecurityTipTuesday: Be cautious about unsolicited emails

You see an email in your inbox that reads,”Your DHL package has arrived!” Oh fantastic, my package arrived! Wait, did I order anything that’s being shipped by DHL? Let me just click and open the attachment to make sure this is ... »

Brute Force: Anatomy of a Cyber Attack, Varonis

The media coverage of NotPetya has hidden what might have been a more significant cyber attack: a brute force attack on the UK Parliament. While for many it was simply fertile ground for Twitter Brexit jokes, a cyber attack like this that ... »

Addressing the increasing risk of web applications

According to Verizon’s recent security report, attacks on web applications are now the leading source of data enterprise breaches, up 500% since 2014. The spike in attacks has caused cyber security professionals to be most concerned about customer facing web ... »

Ten Practical Steps to Protect Your Online Privacy via Cylance

Two things happened recently which should raise an alarm for anyone concerned about their online privacy. The first was a major release by WikiLeaks on March 7, 2017 of a trove of hacks and hacking techniques allegedly employed by the CIA ... »

Infected By Ransomware. Now What?

Don’t negotiate with e-terrorists. Be a hero and rescue your hostage PC. With nasty malware like Locky making the rounds—encrypting its victims’ files, and then refusing to unlock them unless you pay up—ransomware is a serious headache. But not all ransomware ... »