Test Your Knowledge of These 3 Common Security Threats
Security is a critical part of running your business, especially in a world where organizations require technology for most any task. In fact, some of the most dangerous threats are known to hide within a company’s network, waiting for any opportunity to strike. With the right preventative measures, you can keep your network safe from […]
These Innovative Technologies are Helping eBay Move Beyond Passwords
Technology continues to grow more advanced, and with it comes major pain points that need to be resolved. Today’s modern businesses will need to adapt by implementing new solutions for both themselves and their customers or clients. In this fashion, eBay has begun to implement an assortment of new features to assist with the customer […]
Monsters aren’t Real, But Ransomware Sure Is!
Halloween is a time when creatures like ghosts and goblins are celebrated rather than feared. Even adults use the holiday to lighten up and enjoy themselves, as they’re well aware that the monsters so often seen and heard about in stories are fictional. Unfortunately, the fact remains that there are monsters hiding in plain sight […]
What Volkswagen is Doing to Prevent Hackers From Controlling Your Car
Today’s cars are equipped with more complicated computer systems that allow users access to cutting-edge technology and services. Due to the increasing number of cyber attacks on computerized cars, Volkswagen has chosen to team up with three Israeli cybersecurity experts to equip advanced vehicles with the proper security solutions. Ownership and investments made by both […]
Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine
Banks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft–by no less than the Secret Service. Machines in Connecticut and Pennsylvania have been found to have periscope skimmer devices attached inside, especially in those machines with openable lids that […]
According to FBI Director, Privacy is a Misnomer
There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like […]
Tip of the Week: Why You Should Be Wary of Using Public Wi-Fi
Wireless Internet connections, often referred to by the moniker Wi-Fi, have become a popular offering from public businesses. Even organizations that have no real need for an Internet connection to conduct business, like restaurants and coffee shops, now offer Wi-Fi for their customers. However, public Wi-Fi can be dangerous, especially for the business professional. The […]
Exploits From the NSA are Now on the Black Market
If you panic in the event of a hacking attack, imagine how the National Security Agency (NSA) feels knowing that some of its exploits are for sale on the black market. While there isn’t any proof that the NSA has been breached, there’s evidence to suspect that their exploits are available for purchase on the […]
MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For
Payment via mobile devices is still a relatively new concept. With newer smartphones, it’s now easier than ever to pay your bills or send money on a whim. However, this also brings up an important topic; what’s the best way to handle mobile payments, and how can those who accept and process these payments ensure […]
Alert: Microsoft Outlook Users Be Wary of New Ransomware
Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for […]
For NATO, Cyberspace is Today’s Frontlines
It’s clear that security professionals have waged war with hackers since the Internet’s inception, but NATO has reaffirmed that cybersecurity is not just a localized problem; it’s a nation-state-wide issue, and one that needs to be addressed. Just like land, air, and sea, cyberspace is now an operational domain, a place that can be considered […]
Study: 95% of All Cyber Attacks are Financially Motivated
Businesses need to take security into account and make it a priority. In fact, security is so important that Verizon has compiled a report of the various types of attacks and data breaches that occurred in the past year. This is Verizon’s Data Breach Investigations Report, or DBIR, and it offers insights into how you […]
Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities
Microsoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users that ignore these security patches are putting their system at unnecessary risk. If you’ve already applied the […]
Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
There’s a new augmented reality game on the market these days. Perhaps you’ve heard of it – a title called Pokemon Go, which lets you capture virtual monsters that “appear” on your smartphone’s camera. However, hackers have seized this opportunity to infect players’ mobile devices with a backdoor called DroidJack, which uses the mobile app’s […]
Tip of the Week: Why You Should Rethink Routinely Changing Your Password
One of the main ways to keep an account’s credentials secure is by changing them consistently. However, we ran across an article recently that plays “devil’s advocate” on the password security issue, and they made some fair points about how changing passwords too frequently can lead to decreased security as a whole. At first, this […]
For This Ransomware, “Yes or No” Really Means “Yes or Yes”
The ransomware Petya (previously thought to have been eradicated) has unfortunately resurfaced, and it’s brought a friend to the party. Petya was delivered via an email containing an invitation to apply for a job, including the virus in an executable file that was disguised as a PDF job resume. When a hepless user clicked the […]
Newly Discovered Vulnerability Gives Reason to Worry for Every Windows User
A vulnerability has been discovered that affects all versions of Microsoft’s Windows operating system, including the long-unsupported Windows XP, going all the way back to Windows 95. The vulnerability, called BadTunnel, allows attackers to directly bypass system defenses and initiate a man-in-the-middle attack. The vulnerability isn’t limited to just Windows, either; it also affects Internet […]
Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem
In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security habits. An analysis of the millions of stolen credentials by security company LeakedSource shows […]
4 Crazy Facts About Smartphones You Probably Didn’t Know
You may feel like you’re familiarized with everything your smartphone can do; yet, there are still some little-known things about smartphones that may surprise you. Take for example these four smartphone facts from List25. Wirelessly Charge Your Smartphone’s Battery There’s a day coming when you’ll be able to charge your smartphone wirelessly using radio waves. […]
Researchers From MIT May Have Found the Holy Grail of Network Security
When it comes to cybersecurity, maintenance is key. Whether you choose human-based security or an automated security solution, running into shortcomings is still possible. Human security tends to rely on the word of experts, and anything that doesn’t fit into the guidelines is missed and may therefore get through and wreak havoc. Network security can […]