Site Feeds

Pages

Categories

Monthly Archives

Tags

All Articles

  1. On Chinese “Spy Trains”
    26-Sep-19 • Comments Off on On Chinese “Spy Trains”
  2. Interview With the Guy Who Tried to Frame Me for Heroin Possession
    26-Sep-19 • Comments Off on Interview With the Guy Who Tried to Frame Me for Heroin Possession
  3. Symantec Smart Government: Cyber Redefined
    25-Sep-19 • Comments Off on Symantec Smart Government: Cyber Redefined
  4. ‘Fleeceware’ apps overcharge users for basic app functionality
    25-Sep-19 • Comments Off on ‘Fleeceware’ apps overcharge users for basic app functionality
  5. Ineffective Package Tracking Facilitates Fraud
    25-Sep-19 • Comments Off on Ineffective Package Tracking Facilitates Fraud
  6. Cyber Breach Survivors Welcome: Why Firms Should Hire CISOs with Breach Experience
    25-Sep-19 • Comments Off on Cyber Breach Survivors Welcome: Why Firms Should Hire CISOs with Breach Experience
  7. Mapping the connections inside Russia’s APT Ecosystem
    25-Sep-19 • Comments Off on Mapping the connections inside Russia’s APT Ecosystem
  8. Sophos named a Leader in the 2019 Endpoint Forrester Wave
    24-Sep-19 • Comments Off on Sophos named a Leader in the 2019 Endpoint Forrester Wave
  9. OEM update – Sophos and Arcserve form global tech alliance
    24-Sep-19 • Comments Off on OEM update – Sophos and Arcserve form global tech alliance
  10. Culture Spotlight with Sandeep Kanabar: Making the World Around You Beautiful
    24-Sep-19 • Comments Off on Culture Spotlight with Sandeep Kanabar: Making the World Around You Beautiful
  11. Russians Hack FBI Comms System
    24-Sep-19 • Comments Off on Russians Hack FBI Comms System
  12. Symantec ranked as top ESG Leader
    23-Sep-19 • Comments Off on Symantec ranked as top ESG Leader
  13. Dark Times Call for an Overhaul of Your SOC
    23-Sep-19 • Comments Off on Dark Times Call for an Overhaul of Your SOC
  14. Here’s How Deepfakes Can Harm Your Enterprise — and What to Do About Them
    23-Sep-19 • Comments Off on Here’s How Deepfakes Can Harm Your Enterprise — and What to Do About Them
  15. 23rd September – Threat Intelligence Bulletin
    23-Sep-19 • Comments Off on 23rd September – Threat Intelligence Bulletin
  16. France Outlines Its Approach to Cyberwar
    23-Sep-19 • Comments Off on France Outlines Its Approach to Cyberwar
  17. Crown Sterling Claims to Factor RSA Keylengths First Factored Twenty Years Ago
    20-Sep-19 • Comments Off on Crown Sterling Claims to Factor RSA Keylengths First Factored Twenty Years Ago
  18. A Feminist Take on Information Privacy
    20-Sep-19 • Comments Off on A Feminist Take on Information Privacy
  19. New Biometrics
    20-Sep-19 • Comments Off on New Biometrics
  20. Tortoiseshell Group Targets IT Providers in Saudi Arabia in Probable Supply Chain Attacks
    20-Sep-19 • Comments Off on Tortoiseshell Group Targets IT Providers in Saudi Arabia in Probable Supply Chain Attacks
  21. Out of Focus: Digital Privacy and the Ability to Hide Your Photo from Facial Recognition
    19-Sep-19 • Comments Off on Out of Focus: Digital Privacy and the Ability to Hide Your Photo from Facial Recognition
  22. Sophos is a Visionary in the Network Firewall Magic Quadrant 2019
    19-Sep-19 • Comments Off on Sophos is a Visionary in the Network Firewall Magic Quadrant 2019
  23. Revisiting Software Vulnerabilities in the Boeing 787
    19-Sep-19 • Comments Off on Revisiting Software Vulnerabilities in the Boeing 787
  24. Before He Spammed You, this Sly Prince Stalked Your Mailbox
    18-Sep-19 • Comments Off on Before He Spammed You, this Sly Prince Stalked Your Mailbox
  25. I’m Looking to Hire a Strategist to Help Figure Out Public-Interest Tech
    18-Sep-19 • Comments Off on I’m Looking to Hire a Strategist to Help Figure Out Public-Interest Tech
  26. Cracking Forgotten Passwords
    18-Sep-19 • Comments Off on Cracking Forgotten Passwords
  27. The WannaCry hangover
    18-Sep-19 • Comments Off on The WannaCry hangover
  28. A Story of Gratitude: How One Vietnamese American Found His Authentic Self
    17-Sep-19 • Comments Off on A Story of Gratitude: How One Vietnamese American Found His Authentic Self
  29. Man Who Hired Deadly Swatting Gets 15 Months
    17-Sep-19 • Comments Off on Man Who Hired Deadly Swatting Gets 15 Months
  30. Symantec Mobile Threat Defense: Threat Hunting? Here’s Your Flak Jacket in the Minefield
    17-Sep-19 • Comments Off on Symantec Mobile Threat Defense: Threat Hunting? Here’s Your Flak Jacket in the Minefield
  31. 3 Questions Boards Want Answered About Cyber Security
    16-Sep-19 • Comments Off on 3 Questions Boards Want Answered About Cyber Security
  32. What We’re Doing to Fight the Scourge of Cyber Stalking
    16-Sep-19 • Comments Off on What We’re Doing to Fight the Scourge of Cyber Stalking
  33. 16th September – Threat Intelligence Bulletin
    16-Sep-19 • Comments Off on 16th September – Threat Intelligence Bulletin
  34. Another Side Channel in Intel Chips
    16-Sep-19 • Comments Off on Another Side Channel in Intel Chips
  35. September, 2019 Patch Tuesday updates a raft of Windows weaknesses
    14-Sep-19 • Comments Off on September, 2019 Patch Tuesday updates a raft of Windows weaknesses
  36. Intercept X cleans up in endpoint protection test
    13-Sep-19 • Comments Off on Intercept X cleans up in endpoint protection test
  37. When Biology Becomes Software
    13-Sep-19 • Comments Off on When Biology Becomes Software
  38. Smart Watches and Cheating on Tests
    13-Sep-19 • Comments Off on Smart Watches and Cheating on Tests
  39. Fiese Masche: 2FA-„Feature“ gibt Phishing legitimen Anstrich
    13-Sep-19 • Comments Off on Fiese Masche: 2FA-„Feature“ gibt Phishing legitimen Anstrich
  40. 7 Tipps für mehr Sicherheit in der Public Cloud
    13-Sep-19 • Comments Off on 7 Tipps für mehr Sicherheit in der Public Cloud
  41. Von nichts kommt nichts: Der eigene 4G-Hotspot ist nicht per se sicher – aber das lässt sich ändern…
    13-Sep-19 • Comments Off on Von nichts kommt nichts: Der eigene 4G-Hotspot ist nicht per se sicher – aber das lässt sich ändern…
  42. Schwachstelle Mensch: Trojaner Baldr nutzt Gamer-Natur aus
    13-Sep-19 • Comments Off on Schwachstelle Mensch: Trojaner Baldr nutzt Gamer-Natur aus
  43. Fünf Tipps gegen DSGVO-Bußgelder
    13-Sep-19 • Comments Off on Fünf Tipps gegen DSGVO-Bußgelder
  44. „Zum Supersportwagen reicht es nicht, aber man kommt auf den Geschmack!”
    13-Sep-19 • Comments Off on „Zum Supersportwagen reicht es nicht, aber man kommt auf den Geschmack!”
  45. Fabricated Voice Used in Financial Fraud
    12-Sep-19 • Comments Off on Fabricated Voice Used in Financial Fraud
  46. NY Payroll Company Vanishes With $35 Million
    11-Sep-19 • Comments Off on NY Payroll Company Vanishes With $35 Million
  47. More on Law Enforcement Backdoor Demands
    11-Sep-19 • Comments Off on More on Law Enforcement Backdoor Demands
  48. Microsoft Patch Tuesday – September 2019
    11-Sep-19 • Comments Off on Microsoft Patch Tuesday – September 2019
  49. 25 Jahre QR-Code – Braucht die beliebte Pixel-Matrix ein neues Sicherheitskonzept?
    11-Sep-19 • Comments Off on 25 Jahre QR-Code – Braucht die beliebte Pixel-Matrix ein neues Sicherheitskonzept?
  50. Patch Tuesday, September 2019 Edition
    10-Sep-19 • Comments Off on Patch Tuesday, September 2019 Edition
  51. Supporting My Hispanic Heritage One Paycheck at a Time
    10-Sep-19 • Comments Off on Supporting My Hispanic Heritage One Paycheck at a Time
  52. How to Maximize Threat Intelligence with a Human Touch
    10-Sep-19 • Comments Off on How to Maximize Threat Intelligence with a Human Touch
  53. How to Maximize Threat Intelligence with a Human Touch
    10-Sep-19 • Comments Off on How to Maximize Threat Intelligence with a Human Touch
  54. On Cybersecurity Insurance
    10-Sep-19 • Comments Off on On Cybersecurity Insurance
  55. Intercept X named Best Small Business Endpoint Security Solution by SE Labs
    9-Sep-19 • Comments Off on Intercept X named Best Small Business Endpoint Security Solution by SE Labs
  56. Secret Service Investigates Breach at U.S. Govt IT Contractor
    9-Sep-19 • Comments Off on Secret Service Investigates Breach at U.S. Govt IT Contractor
  57. Symantec Mobile Threat Defense: Using Mobile to Stay One Step Ahead of PC Attacks
    9-Sep-19 • Comments Off on Symantec Mobile Threat Defense: Using Mobile to Stay One Step Ahead of PC Attacks
  58. 9th September – Threat Intelligence Bulletin
    9-Sep-19 • Comments Off on 9th September – Threat Intelligence Bulletin
  59. Thrip: Ambitious Attacks Against High Level Targets Continue
    9-Sep-19 • Comments Off on Thrip: Ambitious Attacks Against High Level Targets Continue
  60. NotPetya
    9-Sep-19 • Comments Off on NotPetya
  61. Default Password for GPS Trackers
    6-Sep-19 • Comments Off on Default Password for GPS Trackers
  62. Phishing for a Proactive Security Culture
    5-Sep-19 • Comments Off on Phishing for a Proactive Security Culture
  63. UPSynergy: Chinese-American Spy vs. Spy Story
    5-Sep-19 • Comments Off on UPSynergy: Chinese-American Spy vs. Spy Story
  64. The Doghouse: Crown Sterling
    5-Sep-19 • Comments Off on The Doghouse: Crown Sterling
  65. Advanced SMS Phishing Attacks Against Modern Android-based Smartphones
    4-Sep-19 • Comments Off on Advanced SMS Phishing Attacks Against Modern Android-based Smartphones
  66. Credit Card Privacy
    4-Sep-19 • Comments Off on Credit Card Privacy
  67. ‘Satori’ IoT Botnet Operator Pleads Guilty
    4-Sep-19 • Comments Off on ‘Satori’ IoT Botnet Operator Pleads Guilty
  68. Spam In your Calendar? Here’s What to Do.
    3-Sep-19 • Comments Off on Spam In your Calendar? Here’s What to Do.
  69. Turning Dots into Lines: Featuring the Perspectives of Symantec Women in APJ – Part Three
    3-Sep-19 • Comments Off on Turning Dots into Lines: Featuring the Perspectives of Symantec Women in APJ – Part Three
  70. Fighting Ransomware? Get Ready for the Hunt
    3-Sep-19 • Comments Off on Fighting Ransomware? Get Ready for the Hunt
  71. Best Practices in Targeted Ransomware Attacks
    3-Sep-19 • Comments Off on Best Practices in Targeted Ransomware Attacks
  72. Massive iPhone Hack Targets Uyghurs
    3-Sep-19 • Comments Off on Massive iPhone Hack Targets Uyghurs
  73. Feds Allege Adconion Employees Hijacked IP Addresses for Spamming
    2-Sep-19 • Comments Off on Feds Allege Adconion Employees Hijacked IP Addresses for Spamming
  74. 2nd September – Threat Intelligence Bulletin
    2-Sep-19 • Comments Off on 2nd September – Threat Intelligence Bulletin
  75. How Banking LoB and Cyber Security Teams Can Get on the Same Page
    1-Sep-19 • Comments Off on How Banking LoB and Cyber Security Teams Can Get on the Same Page
  76. August, 2019 Patch Tuesday Targets Remote Desktop and Active Directory
    30-Aug-19 • Comments Off on August, 2019 Patch Tuesday Targets Remote Desktop and Active Directory
  77. Phishers are Angling for Your Cloud Providers
    30-Aug-19 • Comments Off on Phishers are Angling for Your Cloud Providers
  78. Attacking the Intel Secure Enclave
    30-Aug-19 • Comments Off on Attacking the Intel Secure Enclave
  79. Ransomware Bites Dental Data Backup Firm
    29-Aug-19 • Comments Off on Ransomware Bites Dental Data Backup Firm
  80. Why organizations need intelligent EDR
    29-Aug-19 • Comments Off on Why organizations need intelligent EDR
  81. AI Emotion-Detection Arms Race
    29-Aug-19 • Comments Off on AI Emotion-Detection Arms Race
  82. Symantec Enterprise Success Receives ASP’s ‘Ten Best Web Support Sites’ Award
    28-Aug-19 • Comments Off on Symantec Enterprise Success Receives ASP’s ‘Ten Best Web Support Sites’ Award
  83. Why EDR and Managed EDR Are Central to Better Threat Detection and Response
    28-Aug-19 • Comments Off on Why EDR and Managed EDR Are Central to Better Threat Detection and Response
  84. Strengthening National Security through Public-Private Partnerships
    28-Aug-19 • Comments Off on Strengthening National Security through Public-Private Partnerships
  85. IDG Contributor Network: Why I’m not sold on machine learning in autonomous security
    28-Aug-19 • Comments Off on IDG Contributor Network: Why I’m not sold on machine learning in autonomous security
  86. The Myth of Consumer-Grade Security
    28-Aug-19 • Comments Off on The Myth of Consumer-Grade Security
  87. Culture Spotlight with Jared Karol: Using Social Capital to Drive Impact and Affect Change
    27-Aug-19 • Comments Off on Culture Spotlight with Jared Karol: Using Social Capital to Drive Impact and Affect Change
  88. Cybersecurity Firm Imperva Discloses Breach
    27-Aug-19 • Comments Off on Cybersecurity Firm Imperva Discloses Breach
  89. Users: How to Turn Your Greatest Weakness into Your First Line of Defense
    27-Aug-19 • Comments Off on Users: How to Turn Your Greatest Weakness into Your First Line of Defense
  90. The Two Keys to Zero Trust: Data Loss Prevention and Machine Learning
    27-Aug-19 • Comments Off on The Two Keys to Zero Trust: Data Loss Prevention and Machine Learning
  91. The Threat of Fake Academic Research
    27-Aug-19 • Comments Off on The Threat of Fake Academic Research
  92. Not All Data Is Created Equal: Data vs. Actionable Data
    26-Aug-19 • Comments Off on Not All Data Is Created Equal: Data vs. Actionable Data
  93. 26th August – Threat Intelligence Bulletin
    26-Aug-19 • Comments Off on 26th August – Threat Intelligence Bulletin
  94. Detecting Credit Card Skimmers
    26-Aug-19 • Comments Off on Detecting Credit Card Skimmers
  95. License Plate “NULL”
    23-Aug-19 • Comments Off on License Plate “NULL”
  96. Breach at Hy-Vee Supermarket Chain Tied to Sale of 5M+ Stolen Credit, Debit Cards
    22-Aug-19 • Comments Off on Breach at Hy-Vee Supermarket Chain Tied to Sale of 5M+ Stolen Credit, Debit Cards
  97. Firewall best practices to protect against ransomware
    22-Aug-19 • Comments Off on Firewall best practices to protect against ransomware
  98. Blocking attacks against Windows “CTF” vulnerabilities
    22-Aug-19 • Comments Off on Blocking attacks against Windows “CTF” vulnerabilities
  99. Defining the Best Endpoint Security
    22-Aug-19 • Comments Off on Defining the Best Endpoint Security
  100. Modifying a Tesla to Become a Surveillance Platform
    22-Aug-19 • Comments Off on Modifying a Tesla to Become a Surveillance Platform
  101. Forced Password Reset? Check Your Assumptions
    22-Aug-19 • Comments Off on Forced Password Reset? Check Your Assumptions
  102. Sophos named a Leader in the Gartner EPP Magic Quadrant… again
    21-Aug-19 • Comments Off on Sophos named a Leader in the Gartner EPP Magic Quadrant… again
  103. Everything is bigger in Texas, including ransomware attacks
    21-Aug-19 • Comments Off on Everything is bigger in Texas, including ransomware attacks
  104. Give and Get: Developing and Inspiring Symantec’s Future Leaders
    21-Aug-19 • Comments Off on Give and Get: Developing and Inspiring Symantec’s Future Leaders
  105. Google Finds 20-Year-Old Microsoft Windows Vulnerability
    21-Aug-19 • Comments Off on Google Finds 20-Year-Old Microsoft Windows Vulnerability
  106. Surveillance as a Condition for Humanitarian Aid
    20-Aug-19 • Comments Off on Surveillance as a Condition for Humanitarian Aid
  107. How much should you spend on security?
    20-Aug-19 • Comments Off on How much should you spend on security?
  108. How to market security: 8 tips for recruiting users to your cause
    20-Aug-19 • Comments Off on How to market security: 8 tips for recruiting users to your cause
  109. Taxpayer First Act: Improving identity verification and modernizing the IRS
    19-Aug-19 • Comments Off on Taxpayer First Act: Improving identity verification and modernizing the IRS
  110. Our Identity is Our Competitive Advantage
    19-Aug-19 • Comments Off on Our Identity is Our Competitive Advantage
  111. Symantec Mobile Threat Defense: Stop Relying on Delayed and Invasive Protection Actions
    19-Aug-19 • Comments Off on Symantec Mobile Threat Defense: Stop Relying on Delayed and Invasive Protection Actions
  112. Why Secure Adoption of Cloud Apps is a Team Sport
    19-Aug-19 • Comments Off on Why Secure Adoption of Cloud Apps is a Team Sport
  113. 19th August – Threat Intelligence Bulletin
    19-Aug-19 • Comments Off on 19th August – Threat Intelligence Bulletin
  114. The Rise of “Bulletproof” Residential Networks
    19-Aug-19 • Comments Off on The Rise of “Bulletproof” Residential Networks
  115. IDG Contributor Network: Why cybersecurity is a central ingredient in evolving digital business models
    19-Aug-19 • Comments Off on IDG Contributor Network: Why cybersecurity is a central ingredient in evolving digital business models
  116. Influence Operations Kill Chain
    19-Aug-19 • Comments Off on Influence Operations Kill Chain
  117. 6 risk factors to know when hiring an MSSP
    19-Aug-19 • Comments Off on 6 risk factors to know when hiring an MSSP
  118. IDG Contributor Network: Are you being tracked through a Bluetooth security vulnerability?
    16-Aug-19 • Comments Off on IDG Contributor Network: Are you being tracked through a Bluetooth security vulnerability?
  119. Software Vulnerabilities in the Boeing 787
    16-Aug-19 • Comments Off on Software Vulnerabilities in the Boeing 787
  120. Best antivirus software: 10 top tools
    16-Aug-19 • Comments Off on Best antivirus software: 10 top tools
  121. The best and worst of Black Hat 2019
    16-Aug-19 • Comments Off on The best and worst of Black Hat 2019
  122. More critical Remote Desktop flaws expose Windows systems to hacking
    15-Aug-19 • Comments Off on More critical Remote Desktop flaws expose Windows systems to hacking
  123. Bypassing Apple FaceID’s Liveness Detection Feature
    15-Aug-19 • Comments Off on Bypassing Apple FaceID’s Liveness Detection Feature
  124. Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope
    15-Aug-19 • Comments Off on Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope
  125. Safe travels: 7 best practices for protecting data at border crossings
    15-Aug-19 • Comments Off on Safe travels: 7 best practices for protecting data at border crossings
  126. Beware rogue email rules and forms
    15-Aug-19 • Comments Off on Beware rogue email rules and forms
  127. Microsoft Patch Tuesday – August 2019
    15-Aug-19 • Comments Off on Microsoft Patch Tuesday – August 2019
  128. BrandPost: Securing Your Multi-Cloud Strategy
    14-Aug-19 • Comments Off on BrandPost: Securing Your Multi-Cloud Strategy
  129. Side-Channel Attack against Electronic Locks
    14-Aug-19 • Comments Off on Side-Channel Attack against Electronic Locks
  130. IDG Contributor Network: Thoughts from Defcon 27 – This is why I do what I do
    14-Aug-19 • Comments Off on IDG Contributor Network: Thoughts from Defcon 27 – This is why I do what I do
  131. Meet Bluetana, the Scourge of Pump Skimmers
    14-Aug-19 • Comments Off on Meet Bluetana, the Scourge of Pump Skimmers
  132. CWP Integration with EventBridge Amplifies Cyber Security Resources
    14-Aug-19 • Comments Off on CWP Integration with EventBridge Amplifies Cyber Security Resources
  133. Attorney General Barr and Encryption
    14-Aug-19 • Comments Off on Attorney General Barr and Encryption
  134. 12 things every computer security pro should know
    14-Aug-19 • Comments Off on 12 things every computer security pro should know
  135. How to check Privileged Identity management settings for Office 365
    14-Aug-19 • Comments Off on How to check Privileged Identity management settings for Office 365
  136. Patch Tuesday, August 2019 Edition
    13-Aug-19 • Comments Off on Patch Tuesday, August 2019 Edition
  137. Speak Up and Take Risks: Featuring the Perspectives of Symantec Women in APJ – Part Two
    13-Aug-19 • Comments Off on Speak Up and Take Risks: Featuring the Perspectives of Symantec Women in APJ – Part Two
  138. BrandPost: Cybersecurity is a Team Sport
    13-Aug-19 • Comments Off on BrandPost: Cybersecurity is a Team Sport
  139. Exploiting GDPR to Get Private Information
    13-Aug-19 • Comments Off on Exploiting GDPR to Get Private Information
  140. ICS security: Popular building management system vulnerable to takeover
    13-Aug-19 • Comments Off on ICS security: Popular building management system vulnerable to takeover
  141. Developing personal OPSEC plans: 10 tips for protecting high-value targets
    13-Aug-19 • Comments Off on Developing personal OPSEC plans: 10 tips for protecting high-value targets
  142. SEC Investigating Data Leak at First American Financial Corp.
    12-Aug-19 • Comments Off on SEC Investigating Data Leak at First American Financial Corp.
  143. Are You Ready for Layered Cybercrime Operations?
    12-Aug-19 • Comments Off on Are You Ready for Layered Cybercrime Operations?
  144. 12th August – Threat Intelligence Bulletin
    12-Aug-19 • Comments Off on 12th August – Threat Intelligence Bulletin
  145. Evaluating the NSA’s Telephony Metadata Program
    12-Aug-19 • Comments Off on Evaluating the NSA’s Telephony Metadata Program
  146. Say Cheese: Ransomware-ing a DSLR Camera
    11-Aug-19 • Comments Off on Say Cheese: Ransomware-ing a DSLR Camera
  147. SELECT code_execution FROM * USING SQLite;
    11-Aug-19 • Comments Off on SELECT code_execution FROM * USING SQLite;
  148. BlackHat 2019: Security Lessons from the Front Lines
    10-Aug-19 • Comments Off on BlackHat 2019: Security Lessons from the Front Lines
  149. iNSYNQ Ransom Attack Began With Phishing Email
    9-Aug-19 • Comments Off on iNSYNQ Ransom Attack Began With Phishing Email
  150. BlackHat 2019: An Urgent Call for “Public-Interest Technologists
    9-Aug-19 • Comments Off on BlackHat 2019: An Urgent Call for “Public-Interest Technologists
  151. BlackHat 2019: Don’t Assume that 5G Networks Can’t Get Hacked
    9-Aug-19 • Comments Off on BlackHat 2019: Don’t Assume that 5G Networks Can’t Get Hacked
  152. Sophos wins multiple channel leadership awards
    8-Aug-19 • Comments Off on Sophos wins multiple channel leadership awards
  153. Supply-Chain Attack against the Electron Development Platform
    8-Aug-19 • Comments Off on Supply-Chain Attack against the Electron Development Platform
  154. Are You Ready for Malware-as-a-Service?
    8-Aug-19 • Comments Off on Are You Ready for Malware-as-a-Service?
  155. Black Hat 2019 – WhatsApp Protocol Decryption for Chat Manipulation and More
    8-Aug-19 • Comments Off on Black Hat 2019 – WhatsApp Protocol Decryption for Chat Manipulation and More
  156. Reverse RDP Attack: The Hyper-V Connection
    8-Aug-19 • Comments Off on Reverse RDP Attack: The Hyper-V Connection
  157. AT&T Employees Took Bribes to Unlock Smartphones
    8-Aug-19 • Comments Off on AT&T Employees Took Bribes to Unlock Smartphones
  158. BlackHat 2019: Research Finds Electric Motors Vulnerable to Hackers
    8-Aug-19 • Comments Off on BlackHat 2019: Research Finds Electric Motors Vulnerable to Hackers
  159. How to Protect Yourself in the Cloud: Tips and Best Practices
    8-Aug-19 • Comments Off on How to Protect Yourself in the Cloud: Tips and Best Practices
  160. BlackHat 2019: Researchers Find Way to Fool Biometric Authentication
    7-Aug-19 • Comments Off on BlackHat 2019: Researchers Find Way to Fool Biometric Authentication
  161. Who Owns Your Wireless Service? Crooks Do.
    7-Aug-19 • Comments Off on Who Owns Your Wireless Service? Crooks Do.
  162. Brazilian Cell Phone Hack
    7-Aug-19 • Comments Off on Brazilian Cell Phone Hack
  163. TIPP Turns 2 and There’s Big News to Share
    7-Aug-19 • Comments Off on TIPP Turns 2 and There’s Big News to Share
  164. Rooting for the Underdog
    6-Aug-19 • Comments Off on Rooting for the Underdog
  165. Taking Cyber Security to New Levels of Visibility and Rapid Response
    6-Aug-19 • Comments Off on Taking Cyber Security to New Levels of Visibility and Rapid Response
  166. Baldr vs The World: A SophosLabs report
    6-Aug-19 • Comments Off on Baldr vs The World: A SophosLabs report
  167. Phone Farming for Ad Fraud
    6-Aug-19 • Comments Off on Phone Farming for Ad Fraud
  168. 5th August – Threat Intelligence Bulletin
    6-Aug-19 • Comments Off on 5th August – Threat Intelligence Bulletin
  169. Symantec Mobile Threat Defense: Why Deployment Can Make or Break Your Mobile Security ROI
    5-Aug-19 • Comments Off on Symantec Mobile Threat Defense: Why Deployment Can Make or Break Your Mobile Security ROI
  170. Regulating International Trade in Commercial Spyware
    5-Aug-19 • Comments Off on Regulating International Trade in Commercial Spyware
  171. The Risk of Weak Online Banking Passwords
    5-Aug-19 • Comments Off on The Risk of Weak Online Banking Passwords
  172. Would you fall for a BEC attack?
    5-Aug-19 • Comments Off on Would you fall for a BEC attack?
  173. What We Can Learn from the Capital One Hack
    2-Aug-19 • Comments Off on What We Can Learn from the Capital One Hack
  174. More on Backdooring (or Not) WhatsApp
    2-Aug-19 • Comments Off on More on Backdooring (or Not) WhatsApp
  175. Disabling Security Cameras with Lasers
    2-Aug-19 • Comments Off on Disabling Security Cameras with Lasers
  176. How Privacy Laws Hurt Defendants
    2-Aug-19 • Comments Off on How Privacy Laws Hurt Defendants
  177. Facebook Plans on Backdooring WhatsApp
    1-Aug-19 • Comments Off on Facebook Plans on Backdooring WhatsApp
  178. 5 Must-Have Elements to Include in Your Security Awareness Program
    31-Jul-19 • Comments Off on 5 Must-Have Elements to Include in Your Security Awareness Program
  179. Cobalt Group Returns To Kazakhstan
    31-Jul-19 • Comments Off on Cobalt Group Returns To Kazakhstan
  180. Another Attack Against Driverless Cars
    31-Jul-19 • Comments Off on Another Attack Against Driverless Cars
  181. Culture Spotlight with Ian Kudzinowski: We Are Each an Integral Part of the Jigsaw Puzzle
    31-Jul-19 • Comments Off on Culture Spotlight with Ian Kudzinowski: We Are Each an Integral Part of the Jigsaw Puzzle
  182. 4 Ways to Ensure You Do Incident Triage Right
    30-Jul-19 • Comments Off on 4 Ways to Ensure You Do Incident Triage Right
  183. Few Phish in a Sea Protected with Email Threat Isolation
    30-Jul-19 • Comments Off on Few Phish in a Sea Protected with Email Threat Isolation
  184. 29th July – Threat Intelligence Bulletin
    30-Jul-19 • Comments Off on 29th July – Threat Intelligence Bulletin
  185. Cryptographic Attacks: A Guide for the Perplexed
    30-Jul-19 • Comments Off on Cryptographic Attacks: A Guide for the Perplexed
  186. Capital One Data Theft Impacts 106M People
    30-Jul-19 • Comments Off on Capital One Data Theft Impacts 106M People
  187. ACLU on the GCHQ Backdoor Proposal
    30-Jul-19 • Comments Off on ACLU on the GCHQ Backdoor Proposal
  188. The Revival and Rise of Email Extortion Scams
    30-Jul-19 • Comments Off on The Revival and Rise of Email Extortion Scams
  189. No Jail Time for “WannaCry Hero”
    29-Jul-19 • Comments Off on No Jail Time for “WannaCry Hero”
  190. Cloud Security is Overwhelming. AI and Machine Learning Can Help
    29-Jul-19 • Comments Off on Cloud Security is Overwhelming. AI and Machine Learning Can Help
  191. Wanted: Cybersecurity Imagery
    29-Jul-19 • Comments Off on Wanted: Cybersecurity Imagery
  192. FaceApp – Der Wolf im Schafspelz ist nicht allein
    26-Jul-19 • Comments Off on FaceApp – Der Wolf im Schafspelz ist nicht allein
  193. Studie: Deutschland überdurchschnittlich oft Opfer von Phishing-Attacken und Ransomware
    26-Jul-19 • Comments Off on Studie: Deutschland überdurchschnittlich oft Opfer von Phishing-Attacken und Ransomware
  194. Kampf der Giganten: Apple tritt gegen Anmelde-Services von Facebook und Google an
    26-Jul-19 • Comments Off on Kampf der Giganten: Apple tritt gegen Anmelde-Services von Facebook und Google an
  195. Wenn der SQL-Server versucht, mit Ransomware zu erpressen
    26-Jul-19 • Comments Off on Wenn der SQL-Server versucht, mit Ransomware zu erpressen
  196. Gemischtes Doppel in der Hackerszene: Blended Attacks auf dem Vormarsch
    26-Jul-19 • Comments Off on Gemischtes Doppel in der Hackerszene: Blended Attacks auf dem Vormarsch
  197. „Matrix“-Fans lassen „MegaCortex“-Ransomware weltweit attackieren
    26-Jul-19 • Comments Off on „Matrix“-Fans lassen „MegaCortex“-Ransomware weltweit attackieren
  198. Ist die Nutzung von öffentlichem WIFI eine gute Idee? Kommt drauf an….
    26-Jul-19 • Comments Off on Ist die Nutzung von öffentlichem WIFI eine gute Idee? Kommt drauf an….
  199. Perfider Angriff: Verschlüsselung durch Remote Ransomware
    26-Jul-19 • Comments Off on Perfider Angriff: Verschlüsselung durch Remote Ransomware
  200. Honeypot für Cloud Server: Die Angriffe sind zahlreich – und verdammt schnell!
    26-Jul-19 • Comments Off on Honeypot für Cloud Server: Die Angriffe sind zahlreich – und verdammt schnell!
  201. Eine Generation Datenkidnapping: Ransomware wird 30
    26-Jul-19 • Comments Off on Eine Generation Datenkidnapping: Ransomware wird 30
  202. Insider Logic Bombs
    26-Jul-19 • Comments Off on Insider Logic Bombs
  203. Software Developers and Security
    26-Jul-19 • Comments Off on Software Developers and Security
  204. CYBER ATTACK TRENDS: 2019 MID-YEAR REPORT
    26-Jul-19 • Comments Off on CYBER ATTACK TRENDS: 2019 MID-YEAR REPORT
  205. The Unsexy Threat to Election Security
    25-Jul-19 • Comments Off on The Unsexy Threat to Election Security
  206. Wi-Fi Security Demands More than WPA3
    25-Jul-19 • Comments Off on Wi-Fi Security Demands More than WPA3
  207. Neo-Nazi SWATters Target Dozens of Journalists
    24-Jul-19 • Comments Off on Neo-Nazi SWATters Target Dozens of Journalists
  208. Attorney General William Barr on Encryption Policy
    24-Jul-19 • Comments Off on Attorney General William Barr on Encryption Policy
  209. The security of machine learning
    24-Jul-19 • Comments Off on The security of machine learning
  210. BEC Scams Remain a Billion-Dollar Enterprise, Targeting 6K Businesses Monthly
    24-Jul-19 • Comments Off on BEC Scams Remain a Billion-Dollar Enterprise, Targeting 6K Businesses Monthly
  211. Embracing Challenges: Featuring the Perspectives of Symantec Women in APJ – Part One
    23-Jul-19 • Comments Off on Embracing Challenges: Featuring the Perspectives of Symantec Women in APJ – Part One
  212. Tuning DLP for Success
    23-Jul-19 • Comments Off on Tuning DLP for Success
  213. Science Fiction Writers Helping Imagine Future Threats
    23-Jul-19 • Comments Off on Science Fiction Writers Helping Imagine Future Threats
  214. How Immature Security Practices Complicate Cloud Migration
    22-Jul-19 • Comments Off on How Immature Security Practices Complicate Cloud Migration
  215. 3 reasons attackers love your servers
    22-Jul-19 • Comments Off on 3 reasons attackers love your servers
  216. What You Should Know About the Equifax Data Breach Settlement
    22-Jul-19 • Comments Off on What You Should Know About the Equifax Data Breach Settlement
  217. 22nd July – Threat Intelligence Bulletin
    22-Jul-19 • Comments Off on 22nd July – Threat Intelligence Bulletin
  218. Hackers Expose Russian FSB Cyberattack Projects
    22-Jul-19 • Comments Off on Hackers Expose Russian FSB Cyberattack Projects
  219. Symantec Cloud Workload Suite Protects Across Utilities, Healthcare, Energy
    19-Jul-19 • Comments Off on Symantec Cloud Workload Suite Protects Across Utilities, Healthcare, Energy
  220. Amenaza móvil: Los atacantes pueden manipular archivos multimedia de WhatsApp y Telegram
    19-Jul-19 • Comments Off on Amenaza móvil: Los atacantes pueden manipular archivos multimedia de WhatsApp y Telegram
  221. QuickBooks Cloud Hosting Firm iNSYNQ Hit in Ransomware Attack
    19-Jul-19 • Comments Off on QuickBooks Cloud Hosting Firm iNSYNQ Hit in Ransomware Attack
  222. John Paul Stevens Was a Cryptographer
    19-Jul-19 • Comments Off on John Paul Stevens Was a Cryptographer
  223. A new Equation Editor exploit goes commercial, as maldoc attacks using it spike
    18-Jul-19 • Comments Off on A new Equation Editor exploit goes commercial, as maldoc attacks using it spike
  224. Identity Theft on the Job Market
    18-Jul-19 • Comments Off on Identity Theft on the Job Market
  225. Sym Mobile Threat: Invasores podem manipular seus arquivos de mídia do WhatsApp e Telegram
    18-Jul-19 • Comments Off on Sym Mobile Threat: Invasores podem manipular seus arquivos de mídia do WhatsApp e Telegram
  226. Targeted Ransomware: Proliferating Menace Threatens Organizations
    18-Jul-19 • Comments Off on Targeted Ransomware: Proliferating Menace Threatens Organizations
  227. Party Like a Russian, Carder’s Edition
    17-Jul-19 • Comments Off on Party Like a Russian, Carder’s Edition
  228. Why We Advocate
    17-Jul-19 • Comments Off on Why We Advocate
  229. Climbing Mountains
    16-Jul-19 • Comments Off on Climbing Mountains
  230. Zoom Vulnerability
    16-Jul-19 • Comments Off on Zoom Vulnerability
  231. How Do You Protect Users from Themselves?
    16-Jul-19 • Comments Off on How Do You Protect Users from Themselves?
  232. Meet the World’s Biggest ‘Bulletproof’ Hoster
    16-Jul-19 • Comments Off on Meet the World’s Biggest ‘Bulletproof’ Hoster
  233. 15th July – Threat Intelligence Bulletin
    15-Jul-19 • Comments Off on 15th July – Threat Intelligence Bulletin
  234. Is ‘REvil’ the New GandCrab Ransomware?
    15-Jul-19 • Comments Off on Is ‘REvil’ the New GandCrab Ransomware?
  235. Palantir’s Surveillance Service for Law Enforcement
    15-Jul-19 • Comments Off on Palantir’s Surveillance Service for Law Enforcement
  236. Upcoming Speaking Engagements
    13-Jul-19 • Comments Off on Upcoming Speaking Engagements
  237. Clickable Endnotes to Click Here to Kill Everybody
    12-Jul-19 • Comments Off on Clickable Endnotes to Click Here to Kill Everybody
  238. 5 ways to avoid a GDPR fine
    12-Jul-19 • Comments Off on 5 ways to avoid a GDPR fine
  239. Presidential Candidate Andrew Yang Has Quantum Encryption Policy
    12-Jul-19 • Comments Off on Presidential Candidate Andrew Yang Has Quantum Encryption Policy
  240. FEC: Campaigns Can Use Discounted Cybersecurity Services
    11-Jul-19 • Comments Off on FEC: Campaigns Can Use Discounted Cybersecurity Services
  241. ‘Oto Gonderici’ Excel formula injections target Turkish victims
    11-Jul-19 • Comments Off on ‘Oto Gonderici’ Excel formula injections target Turkish victims
  242. Resetting Your GE Smart Light Bulb
    11-Jul-19 • Comments Off on Resetting Your GE Smart Light Bulb
  243. Details of the Cloud Hopper Attacks
    10-Jul-19 • Comments Off on Details of the Cloud Hopper Attacks
  244. Patch Tuesday Lowdown, July 2019 Edition
    9-Jul-19 • Comments Off on Patch Tuesday Lowdown, July 2019 Edition
  245. 16 critical vulnerabilities, some being exploited, fixed in July, 2019 Windows updates
    9-Jul-19 • Comments Off on 16 critical vulnerabilities, some being exploited, fixed in July, 2019 Windows updates
  246. CVE-2019-0888: Use-After-Free in Windows ActiveX Data Objects (ADO)
    9-Jul-19 • Comments Off on CVE-2019-0888: Use-After-Free in Windows ActiveX Data Objects (ADO)
  247. Cell Networks Hacked by (Probable) Nation-State Attackers
    9-Jul-19 • Comments Off on Cell Networks Hacked by (Probable) Nation-State Attackers
  248. Who’s Behind the GandCrab Ransomware?
    8-Jul-19 • Comments Off on Who’s Behind the GandCrab Ransomware?
  249. 8th July – Threat Intelligence Bulletin
    8-Jul-19 • Comments Off on 8th July – Threat Intelligence Bulletin
  250. 7 best practices for securing the public cloud
    4-Jul-19 • Comments Off on 7 best practices for securing the public cloud
  251. How Intercept X Advanced can help you avoid becoming a ransomware victim
    3-Jul-19 • Comments Off on How Intercept X Advanced can help you avoid becoming a ransomware victim
  252. More fantastic test results for Sophos Intercept X!
    1-Jul-19 • Comments Off on More fantastic test results for Sophos Intercept X!
  253. 1st July – Threat Intelligence Bulletin
    1-Jul-19 • Comments Off on 1st July – Threat Intelligence Bulletin
  254. BlueKeep PoC demonstrates risk of Remote Desktop exploit
    1-Jul-19 • Comments Off on BlueKeep PoC demonstrates risk of Remote Desktop exploit
  255. Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers
    28-Jun-19 • Comments Off on Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers
  256. Sophos Mobile Security earns full marks in AV-Test Android malware review
    28-Jun-19 • Comments Off on Sophos Mobile Security earns full marks in AV-Test Android malware review
  257. Breach at Cloud Solution Provider PCM Inc.
    27-Jun-19 • Comments Off on Breach at Cloud Solution Provider PCM Inc.
  258. Tracing the Supply Chain Attack on Android
    25-Jun-19 • Comments Off on Tracing the Supply Chain Attack on Android
  259. 24th June – Threat Intelligence Bulletin
    24-Jun-19 • Comments Off on 24th June – Threat Intelligence Bulletin
  260. Thumbs Up: Using Machine Learning to Improve IDA’s Analysis
    24-Jun-19 • Comments Off on Thumbs Up: Using Machine Learning to Improve IDA’s Analysis
  261. Collections Firm Behind LabCorp, Quest Breaches Files for Bankruptcy
    20-Jun-19 • Comments Off on Collections Firm Behind LabCorp, Quest Breaches Files for Bankruptcy
  262. Hey, You Get Off My Cloud
    18-Jan-19 • 0 Comment
  263. Cyber Threats Predicted To Emerge In 2019
    18-Dec-18 • 0 Comment
  264. Staying Alive In The Age Of Cyberattacks
    10-Dec-18 • 0 Comment
  265. Hackers Get Into University
    26-Oct-18 • 0 Comment
  266. It Could Still Be Light’s Out For The U.S.
    2-Sep-18 • 0 Comment
  267. Familiarity Makes Cyber Threats More Threatening
    10-Aug-18 • 0 Comment
  268. GrandCrab Grabs More Than $600,000 In Ransom Payments
    18-Jul-18 • 0 Comment
  269. Fitness App Scammers Pinpoint Where Users Work And Live
    10-Jul-18 • 0 Comment
  270. Cyber Security Expert, Paulius Petretis Reveals That Cybercrime Is Now One Of The World’s Leading Industries Leading To Even Greater Need For Cybersecurity
    25-Jun-18 • 0 Comment
  271. Cyber Security Expert, Paulius Petretis Offers Tech Savvy Tips For Travelers During The Busy Summer Vacation Season
    21-Jun-18 • 0 Comment
  272. Cybersecurity More Crucial Than Ever
    20-Jun-18 • 0 Comment
  273. How To Be Tech Savvy While Traveling
    18-Jun-18 • 0 Comment
  274. Cyber Security Expert, Paulius Petretis Reveals Information That Indicates Cyberattacks Are Getting Nastier.
    20-Apr-18 • 0 Comment
  275. One Of The Most Common Typos Can Take You Into Criminal Territory
    13-Apr-18 • 0 Comment
  276. Cyber Security Expert, Paulius Petretis Reveals How A Common Typo Can Lead To Disruption And Infection
    10-Apr-18 • 0 Comment
  277. Corporations And Governments Prepare For “Nastier Cyberattacks”
    6-Apr-18 • 0 Comment
  278. New Pathway To Monetization For Crypto Mining Criminals
    21-Mar-18 • 0 Comment
  279. Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis Uses Recent Corporate Fine As Example To Inspire Businesses Into GDPR Compliance.
    23-Feb-18 • 0 Comment
  280. Cyber Security Expert, Paulius Petretis Keeps His Customers Data Safe With State-of-the-Art EU General Data Protection Regulation Compliance Suite.
    12-Feb-18 • 0 Comment
  281. The High Cost Of Compromising Customer And Employee Data
    10-Feb-18 • 0 Comment
  282. VORAS Consulting Offers Fully Automated EU General Data Protection Regulation Compliance Suite
    10-Feb-18 • 0 Comment
  283. Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis Talks About WPA3.
    19-Jan-18 • 0 Comment
  284. New Wi-Fi Protected Access 3 Coming
    17-Jan-18 • 0 Comment
  285. Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis Talks Zombies.
    10-Jan-18 • 0 Comment
  286. When The Internet of Things (IoT) Turns Your Business Into A Zombie
    8-Jan-18 • 0 Comment
  287. Bad Rabbit Pretending To Be Something You’re Not
    5-Dec-17 • 0 Comment
  288. Director of VORAS Consulting, Paulius Petretis On Growing Dangers in The Cyber World.
    4-Dec-17 • 0 Comment
  289. In The Cyber World Dangers Lurk In Every Nook And Cranny
    2-Dec-17 • 0 Comment
  290. Director of VORAS Consulting, Paulius Petretis Reviews GDPR And Equifax Lawsuits
    1-Dec-17 • 0 Comment
  291. Would You Rather Pay For Cyber-security Or Face Endless Lawsuits
    30-Nov-17 • 0 Comment
  292. October Is Global Cyber Security Month
    15-Oct-17 • 0 Comment
  293. Director of VORAS Consulting, Paulius Petretis Writes About Wi-Fi KRACK Attack
    13-Oct-17 • 0 Comment
  294. Director of VORAS Consulting, Paulius Petretis On The New Cyber Security Regulations.
    12-Oct-17 • 0 Comment
  295. Wave of Cyber Security Regulations Starting To Spread
    10-Oct-17 • 0 Comment
  296. KRACK Disclosed In Wi-Fi Networks
    10-Oct-17 • 0 Comment
  297. Equifax Data Breach Puts UK Customers and Americans At Risk
    17-Sep-17 • 0 Comment
  298. Wanna Cry Crooks Could Be Crying Over Lousy Pay Day
    23-Aug-17 • 0 Comment
  299. Smart Homes, Smart Cars, Smart Devices, Smarter Cyber Criminals
    15-Aug-17 • 0 Comment
  300. Latest Global Ransomware Attack Hits Ukraine Hard
    10-Jul-17 • 0 Comment
  301. Cyber Security Expert, Paulius Petretis Wonders Who Will Be Forced To Join New Club
    18-Jun-17 • 0 Comment
  302. Who Will Become Members of The ‘Hacker-of-The-Month’ Club?
    15-Jun-17 • 0 Comment
  303. Director of VORAS Consulting, Paulius Petretis On Why Criminals Value Email Accounts
    13-Jun-17 • 0 Comment
  304. How Much Is An Email Account Worth To Cyber Criminals
    10-Jun-17 • 0 Comment
  305. Cyber Security Expert, Paulius Petretis Talks About Security Holes in Intel Platforms
    18-May-17 • 0 Comment
  306. If You Use Intel Platforms Your Data Is Vulnerable
    15-May-17 • 0 Comment
  307. Director of VORAS Consulting, Paulius Petretis Talks About Recent Randomware Outbreak
    8-May-17 • 0 Comment
  308. Getting Hit By WannaCry and WannaCrypt Makes You Wanna Kick Yourself
    5-May-17 • 0 Comment
  309. Cyber Security Expert, Paulius Petretis Speaks To Businesses Large, Medium and Small.
    24-Apr-17 • 0 Comment
  310. Data Privacy Protection Laws Apply To All Businesses Large and Small
    21-Apr-17 • 0 Comment
  311. Director of VORAS Consulting, Paulius Petretis Talks About Zero-Day Vulnerabilities
    15-Apr-17 • 0 Comment
  312. Is Your Company Prepared To Prevent, Detect or Minimize a Zero-Day Exploit?
    13-Apr-17 • 0 Comment
  313. Business Expert Paulius Petretis Hits Amazon Best-Seller List
    13-Apr-17 • 0 Comment
  314. Information Security Expert Paulius Petretis Signs Publishing Deal With CelebrityPress To Release New Business Book
    13-Apr-17 • 0 Comment
  315. Failure to Be Compliant With The GDPR Will Be Costly
    24-Mar-17 • 0 Comment
  316. Time to Consider IBM Watson For Advanced Cyber Security
    14-Mar-17 • 0 Comment
  317. Cyber Security Expert, Paulius Petretis Advises Action to Meet Data Protection Ruling.
    8-Feb-17 • 0 Comment
  318. May 2018 Deadline for New Data Protection Compliance
    6-Feb-17 • 0 Comment
  319. Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis On 2017 Threats.
    24-Jan-17 • 0 Comment
  320. Cyber Security Threats and Trends To Watch For This Year
    21-Jan-17 • 0 Comment
  321. Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis Writes About IBM Watson.
    14-Jan-17 • 0 Comment
  322. Let IBM Watson Be Your Company’s Cyber Security Expert
    10-Jan-17 • 0 Comment
  323. Commercial spying gives a job
    7-Jan-13 • 0 Comment
  324. Cracking The Success Code
    26-Jul-12 • 0 Comment
  325. IT Management Certificates
    10-Jan-12 • 0 Comment