Category: Accent

Malware Coming to a Mac Near You? Yes, Say Security Firms

Posted on 4th August 2019

While the password-cracking Mimikatz took top honors, Mac-targeted malware accounted for two of the 10 most detected malware samples, according to WatchGuard.

Article was written by Robert Lemos, Dark Reading.
 

Malware targeting Apple's Mac operating system...

Read more

3 Security Imperatives And The Evolving Digital Topology

Posted on 30th July 2019

No longer can you secure the perimeter or a centralized core and trust that nothing will get in or out. Effective security depends on an in-depth strategy - from the core to the edge.

 

By...

Read more

Stopping stalkerware: What needs to change?

Posted on 28th July 2019

Article by Lysa Myers, WeLiveSecurity

Regardless of whose statistics you read, a disturbingly high percentage of women and men will experience intimate partner violence or harassment in...

Read more

What Every Security Team Should Know About Internet Threats

Posted on 23rd July 2019

Article by Kacy Zurkus, DarkReading

Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.

 

Security teams are...

Read more

You’d better change your birthday – hackers may know your PIN

Posted on 21st July 2019

Article by Jake Moore, at WeLiveSecurity

You’ve likely seen a list of top 25 passwords that get reused time and time again – “password” is a usual suspect – but what about phone...

Read more

Email Threats Continue to Grow as Attackers Evolve, Innovate

Posted on 16th July 2019

Article by Jai Vijayan, News at DarkReading

Threat actors increasingly using malicious URLs, HTTPS domains, file-sharing sites in email attacks, FireEye says.

Email continues to be an extremely effective vector for delivering...

Read more

FBI Warns of Dangers in ‘Safe’ Websites

Posted on 14th July 2019

Article by Curtis Franklin Jr, DarkReading

Criminals are using TLS certificates to convince users that fraudulent sites are worthy of their trust.

One of the most common mechanisms used to secure web...

Read more

Cybersecurity pros think the enemy is winning

Posted on 9th July 2019

Article by Joan Goodchild, Malwarebytes Labs There is a saying in security that the bad guys are always one step ahead of defense. Two new sets of research reveal that the constant cat-and-a mouse game is wearing on security professionals, and...

Read more

The Minefield of Corporate Email

Posted on 7th July 2019

Article by Kelly Sheridan, Dark Reading

Email security challenges CISOs as cybercriminals target corporate inboxes with malware, phishing attempts, and various forms of fraud.

Employee email accounts are prime targets for fraudsters,...

Read more

The aftermath of a data breach: A personal story

Posted on 2nd July 2019

Article by Tony Anscombe, Welivesecurity

Last week I received a notification from Bank of America advising that my credit card may have been part of a compromise at an undisclosed merchant. The email does mention...

Read more

Join our Newsletter

Get updates and the latest scoop in your inbox