Category: Accent

FBI recommends that you keep your IoT devices on a separate network

FBI recommends that you keep your IoT devices on a separate network

Posted on 30th December 2019

The FBI also recommends changing factory-set (default) passwords and not allowing an IoT device's accompanying mobile app to gain access to too many smartphone permissions.

The FBI...

Read more

Thousands of Disney+ Streaming Accounts Hacked and for Sale on Dark Web

Posted on 20th November 2019


Disney’s big new streaming service, Disney+, has already been hacked and the personal information of thousands of customers have been stolen and put up for sale by hackers on the dark web.

Customer accounts are already for sale for...

Read more

Malware Coming to a Mac Near You? Yes, Say Security Firms

Posted on 4th August 2019

While the password-cracking Mimikatz took top honors, Mac-targeted malware accounted for two of the 10 most detected malware samples, according to WatchGuard.

Article was written by Robert Lemos, Dark Reading.

Malware targeting Apple's Mac operating system...

Read more

3 Security Imperatives And The Evolving Digital Topology

Posted on 30th July 2019

No longer can you secure the perimeter or a centralized core and trust that nothing will get in or out. Effective security depends on an in-depth strategy - from the core to the edge.



Read more

Stopping stalkerware: What needs to change?

Posted on 28th July 2019

Article by Lysa Myers, WeLiveSecurity

Regardless of whose statistics you read, a disturbingly high percentage of women and men will experience intimate partner violence or harassment in...

Read more

What Every Security Team Should Know About Internet Threats

Posted on 23rd July 2019

Article by Kacy Zurkus, DarkReading

Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.


Security teams are...

Read more

You’d better change your birthday – hackers may know your PIN

Posted on 21st July 2019

Article by Jake Moore, at WeLiveSecurity

You’ve likely seen a list of top 25 passwords that get reused time and time again – “password” is a usual suspect – but what about phone...

Read more

Email Threats Continue to Grow as Attackers Evolve, Innovate

Posted on 16th July 2019

Article by Jai Vijayan, News at DarkReading

Threat actors increasingly using malicious URLs, HTTPS domains, file-sharing sites in email attacks, FireEye says.

Email continues to be an extremely effective vector for delivering...

Read more

FBI Warns of Dangers in ‘Safe’ Websites

Posted on 14th July 2019

Article by Curtis Franklin Jr, DarkReading

Criminals are using TLS certificates to convince users that fraudulent sites are worthy of their trust.

One of the most common mechanisms used to secure web...

Read more

Cybersecurity pros think the enemy is winning

Posted on 9th July 2019

Article by Joan Goodchild, Malwarebytes Labs There is a saying in security that the bad guys are always one step ahead of defense. Two new sets of research reveal that the constant cat-and-a mouse game is wearing on security professionals, and...

Read more

Join our Newsletter

Get updates and the latest scoop in your inbox