Site Feeds

Pages

Categories

Monthly Archives

Tags

All Articles

  1. Forced Password Reset? Check Your Assumptions
    22-Aug-19 • Comments Off on Forced Password Reset? Check Your Assumptions
  2. Sophos named a Leader in the Gartner EPP Magic Quadrant… again
    21-Aug-19 • Comments Off on Sophos named a Leader in the Gartner EPP Magic Quadrant… again
  3. Everything is bigger in Texas, including ransomware attacks
    21-Aug-19 • Comments Off on Everything is bigger in Texas, including ransomware attacks
  4. Give and Get: Developing and Inspiring Symantec’s Future Leaders
    21-Aug-19 • Comments Off on Give and Get: Developing and Inspiring Symantec’s Future Leaders
  5. Google Finds 20-Year-Old Microsoft Windows Vulnerability
    21-Aug-19 • Comments Off on Google Finds 20-Year-Old Microsoft Windows Vulnerability
  6. Surveillance as a Condition for Humanitarian Aid
    20-Aug-19 • Comments Off on Surveillance as a Condition for Humanitarian Aid
  7. Our Identity is Our Competitive Advantage
    19-Aug-19 • Comments Off on Our Identity is Our Competitive Advantage
  8. Symantec Mobile Threat Defense: Stop Relying on Delayed and Invasive Protection Actions
    19-Aug-19 • Comments Off on Symantec Mobile Threat Defense: Stop Relying on Delayed and Invasive Protection Actions
  9. Symantec Mobile Threat Defense: Stop Relying on Delayed and Invasive Protection Actions
    19-Aug-19 • Comments Off on Symantec Mobile Threat Defense: Stop Relying on Delayed and Invasive Protection Actions
  10. Why Secure Adoption of Cloud Apps is a Team Sport
    19-Aug-19 • Comments Off on Why Secure Adoption of Cloud Apps is a Team Sport
  11. Why Secure Adoption of Cloud Apps is a Team Sport
    19-Aug-19 • Comments Off on Why Secure Adoption of Cloud Apps is a Team Sport
  12. Why Secure Adoption of Cloud Apps is a Team Sport
    19-Aug-19 • Comments Off on Why Secure Adoption of Cloud Apps is a Team Sport
  13. 19th August – Threat Intelligence Bulletin
    19-Aug-19 • Comments Off on 19th August – Threat Intelligence Bulletin
  14. The Rise of “Bulletproof” Residential Networks
    19-Aug-19 • Comments Off on The Rise of “Bulletproof” Residential Networks
  15. Influence Operations Kill Chain
    19-Aug-19 • Comments Off on Influence Operations Kill Chain
  16. Friday Squid Blogging: Robot Squid Propulsion
    16-Aug-19 • Comments Off on Friday Squid Blogging: Robot Squid Propulsion
  17. Software Vulnerabilities in the Boeing 787
    16-Aug-19 • Comments Off on Software Vulnerabilities in the Boeing 787
  18. Bypassing Apple FaceID’s Liveness Detection Feature
    15-Aug-19 • Comments Off on Bypassing Apple FaceID’s Liveness Detection Feature
  19. Microsoft Patch Tuesday – August 2019
    15-Aug-19 • Comments Off on Microsoft Patch Tuesday – August 2019
  20. Side-Channel Attack against Electronic Locks
    14-Aug-19 • Comments Off on Side-Channel Attack against Electronic Locks
  21. Meet Bluetana, the Scourge of Pump Skimmers
    14-Aug-19 • Comments Off on Meet Bluetana, the Scourge of Pump Skimmers
  22. CWP Integration with EventBridge Amplifies Cyber Security Resources
    14-Aug-19 • Comments Off on CWP Integration with EventBridge Amplifies Cyber Security Resources
  23. Attorney General Barr and Encryption
    14-Aug-19 • Comments Off on Attorney General Barr and Encryption
  24. Patch Tuesday, August 2019 Edition
    13-Aug-19 • Comments Off on Patch Tuesday, August 2019 Edition
  25. Speak Up and Take Risks: Featuring the Perspectives of Symantec Women in APJ – Part Two
    13-Aug-19 • Comments Off on Speak Up and Take Risks: Featuring the Perspectives of Symantec Women in APJ – Part Two
  26. Exploiting GDPR to Get Private Information
    13-Aug-19 • Comments Off on Exploiting GDPR to Get Private Information
  27. SEC Investigating Data Leak at First American Financial Corp.
    12-Aug-19 • Comments Off on SEC Investigating Data Leak at First American Financial Corp.
  28. Are You Ready for Layered Cybercrime Operations?
    12-Aug-19 • Comments Off on Are You Ready for Layered Cybercrime Operations?
  29. 12th August – Threat Intelligence Bulletin
    12-Aug-19 • Comments Off on 12th August – Threat Intelligence Bulletin
  30. Evaluating the NSA’s Telephony Metadata Program
    12-Aug-19 • Comments Off on Evaluating the NSA’s Telephony Metadata Program
  31. Say Cheese: Ransomware-ing a DSLR Camera
    11-Aug-19 • Comments Off on Say Cheese: Ransomware-ing a DSLR Camera
  32. SELECT code_execution FROM * USING SQLite;
    11-Aug-19 • Comments Off on SELECT code_execution FROM * USING SQLite;
  33. BlackHat 2019: Security Lessons from the Front Lines
    10-Aug-19 • Comments Off on BlackHat 2019: Security Lessons from the Front Lines
  34. iNSYNQ Ransom Attack Began With Phishing Email
    9-Aug-19 • Comments Off on iNSYNQ Ransom Attack Began With Phishing Email
  35. BlackHat 2019: An Urgent Call for “Public-Interest Technologists
    9-Aug-19 • Comments Off on BlackHat 2019: An Urgent Call for “Public-Interest Technologists
  36. BlackHat 2019: Don’t Assume that 5G Networks Can’t Get Hacked
    9-Aug-19 • Comments Off on BlackHat 2019: Don’t Assume that 5G Networks Can’t Get Hacked
  37. Sophos wins multiple channel leadership awards
    8-Aug-19 • Comments Off on Sophos wins multiple channel leadership awards
  38. Supply-Chain Attack against the Electron Development Platform
    8-Aug-19 • Comments Off on Supply-Chain Attack against the Electron Development Platform
  39. Are You Ready for Malware-as-a-Service?
    8-Aug-19 • Comments Off on Are You Ready for Malware-as-a-Service?
  40. Black Hat 2019 – WhatsApp Protocol Decryption for Chat Manipulation and More
    8-Aug-19 • Comments Off on Black Hat 2019 – WhatsApp Protocol Decryption for Chat Manipulation and More
  41. Reverse RDP Attack: The Hyper-V Connection
    8-Aug-19 • Comments Off on Reverse RDP Attack: The Hyper-V Connection
  42. AT&T Employees Took Bribes to Unlock Smartphones
    8-Aug-19 • Comments Off on AT&T Employees Took Bribes to Unlock Smartphones
  43. BlackHat 2019: Research Finds Electric Motors Vulnerable to Hackers
    8-Aug-19 • Comments Off on BlackHat 2019: Research Finds Electric Motors Vulnerable to Hackers
  44. How to Protect Yourself in the Cloud: Tips and Best Practices
    8-Aug-19 • Comments Off on How to Protect Yourself in the Cloud: Tips and Best Practices
  45. BlackHat 2019: Researchers Find Way to Fool Biometric Authentication
    7-Aug-19 • Comments Off on BlackHat 2019: Researchers Find Way to Fool Biometric Authentication
  46. Who Owns Your Wireless Service? Crooks Do.
    7-Aug-19 • Comments Off on Who Owns Your Wireless Service? Crooks Do.
  47. Brazilian Cell Phone Hack
    7-Aug-19 • Comments Off on Brazilian Cell Phone Hack
  48. TIPP Turns 2 and There’s Big News to Share
    7-Aug-19 • Comments Off on TIPP Turns 2 and There’s Big News to Share
  49. Rooting for the Underdog
    6-Aug-19 • Comments Off on Rooting for the Underdog
  50. Taking Cyber Security to New Levels of Visibility and Rapid Response
    6-Aug-19 • Comments Off on Taking Cyber Security to New Levels of Visibility and Rapid Response
  51. Baldr vs The World: A SophosLabs report
    6-Aug-19 • Comments Off on Baldr vs The World: A SophosLabs report
  52. Phone Farming for Ad Fraud
    6-Aug-19 • Comments Off on Phone Farming for Ad Fraud
  53. 5th August – Threat Intelligence Bulletin
    6-Aug-19 • Comments Off on 5th August – Threat Intelligence Bulletin
  54. Symantec Mobile Threat Defense: Why Deployment Can Make or Break Your Mobile Security ROI
    5-Aug-19 • Comments Off on Symantec Mobile Threat Defense: Why Deployment Can Make or Break Your Mobile Security ROI
  55. Regulating International Trade in Commercial Spyware
    5-Aug-19 • Comments Off on Regulating International Trade in Commercial Spyware
  56. The Risk of Weak Online Banking Passwords
    5-Aug-19 • Comments Off on The Risk of Weak Online Banking Passwords
  57. Would you fall for a BEC attack?
    5-Aug-19 • Comments Off on Would you fall for a BEC attack?
  58. What We Can Learn from the Capital One Hack
    2-Aug-19 • Comments Off on What We Can Learn from the Capital One Hack
  59. More on Backdooring (or Not) WhatsApp
    2-Aug-19 • Comments Off on More on Backdooring (or Not) WhatsApp
  60. Disabling Security Cameras with Lasers
    2-Aug-19 • Comments Off on Disabling Security Cameras with Lasers
  61. How Privacy Laws Hurt Defendants
    2-Aug-19 • Comments Off on How Privacy Laws Hurt Defendants
  62. Facebook Plans on Backdooring WhatsApp
    1-Aug-19 • Comments Off on Facebook Plans on Backdooring WhatsApp
  63. 5 Must-Have Elements to Include in Your Security Awareness Program
    31-Jul-19 • Comments Off on 5 Must-Have Elements to Include in Your Security Awareness Program
  64. Cobalt Group Returns To Kazakhstan
    31-Jul-19 • Comments Off on Cobalt Group Returns To Kazakhstan
  65. Another Attack Against Driverless Cars
    31-Jul-19 • Comments Off on Another Attack Against Driverless Cars
  66. Culture Spotlight with Ian Kudzinowski: We Are Each an Integral Part of the Jigsaw Puzzle
    31-Jul-19 • Comments Off on Culture Spotlight with Ian Kudzinowski: We Are Each an Integral Part of the Jigsaw Puzzle
  67. 4 Ways to Ensure You Do Incident Triage Right
    30-Jul-19 • Comments Off on 4 Ways to Ensure You Do Incident Triage Right
  68. Few Phish in a Sea Protected with Email Threat Isolation
    30-Jul-19 • Comments Off on Few Phish in a Sea Protected with Email Threat Isolation
  69. 29th July – Threat Intelligence Bulletin
    30-Jul-19 • Comments Off on 29th July – Threat Intelligence Bulletin
  70. Cryptographic Attacks: A Guide for the Perplexed
    30-Jul-19 • Comments Off on Cryptographic Attacks: A Guide for the Perplexed
  71. Capital One Data Theft Impacts 106M People
    30-Jul-19 • Comments Off on Capital One Data Theft Impacts 106M People
  72. ACLU on the GCHQ Backdoor Proposal
    30-Jul-19 • Comments Off on ACLU on the GCHQ Backdoor Proposal
  73. The Revival and Rise of Email Extortion Scams
    30-Jul-19 • Comments Off on The Revival and Rise of Email Extortion Scams
  74. No Jail Time for “WannaCry Hero”
    29-Jul-19 • Comments Off on No Jail Time for “WannaCry Hero”
  75. Cloud Security is Overwhelming. AI and Machine Learning Can Help
    29-Jul-19 • Comments Off on Cloud Security is Overwhelming. AI and Machine Learning Can Help
  76. Wanted: Cybersecurity Imagery
    29-Jul-19 • Comments Off on Wanted: Cybersecurity Imagery
  77. FaceApp – Der Wolf im Schafspelz ist nicht allein
    26-Jul-19 • Comments Off on FaceApp – Der Wolf im Schafspelz ist nicht allein
  78. Studie: Deutschland überdurchschnittlich oft Opfer von Phishing-Attacken und Ransomware
    26-Jul-19 • Comments Off on Studie: Deutschland überdurchschnittlich oft Opfer von Phishing-Attacken und Ransomware
  79. Kampf der Giganten: Apple tritt gegen Anmelde-Services von Facebook und Google an
    26-Jul-19 • Comments Off on Kampf der Giganten: Apple tritt gegen Anmelde-Services von Facebook und Google an
  80. Wenn der SQL-Server versucht, mit Ransomware zu erpressen
    26-Jul-19 • Comments Off on Wenn der SQL-Server versucht, mit Ransomware zu erpressen
  81. Gemischtes Doppel in der Hackerszene: Blended Attacks auf dem Vormarsch
    26-Jul-19 • Comments Off on Gemischtes Doppel in der Hackerszene: Blended Attacks auf dem Vormarsch
  82. „Matrix“-Fans lassen „MegaCortex“-Ransomware weltweit attackieren
    26-Jul-19 • Comments Off on „Matrix“-Fans lassen „MegaCortex“-Ransomware weltweit attackieren
  83. Ist die Nutzung von öffentlichem WIFI eine gute Idee? Kommt drauf an….
    26-Jul-19 • Comments Off on Ist die Nutzung von öffentlichem WIFI eine gute Idee? Kommt drauf an….
  84. Perfider Angriff: Verschlüsselung durch Remote Ransomware
    26-Jul-19 • Comments Off on Perfider Angriff: Verschlüsselung durch Remote Ransomware
  85. Honeypot für Cloud Server: Die Angriffe sind zahlreich – und verdammt schnell!
    26-Jul-19 • Comments Off on Honeypot für Cloud Server: Die Angriffe sind zahlreich – und verdammt schnell!
  86. Eine Generation Datenkidnapping: Ransomware wird 30
    26-Jul-19 • Comments Off on Eine Generation Datenkidnapping: Ransomware wird 30
  87. Insider Logic Bombs
    26-Jul-19 • Comments Off on Insider Logic Bombs
  88. Software Developers and Security
    26-Jul-19 • Comments Off on Software Developers and Security
  89. CYBER ATTACK TRENDS: 2019 MID-YEAR REPORT
    26-Jul-19 • Comments Off on CYBER ATTACK TRENDS: 2019 MID-YEAR REPORT
  90. The Unsexy Threat to Election Security
    25-Jul-19 • Comments Off on The Unsexy Threat to Election Security
  91. Wi-Fi Security Demands More than WPA3
    25-Jul-19 • Comments Off on Wi-Fi Security Demands More than WPA3
  92. Neo-Nazi SWATters Target Dozens of Journalists
    24-Jul-19 • Comments Off on Neo-Nazi SWATters Target Dozens of Journalists
  93. Attorney General William Barr on Encryption Policy
    24-Jul-19 • Comments Off on Attorney General William Barr on Encryption Policy
  94. The security of machine learning
    24-Jul-19 • Comments Off on The security of machine learning
  95. BEC Scams Remain a Billion-Dollar Enterprise, Targeting 6K Businesses Monthly
    24-Jul-19 • Comments Off on BEC Scams Remain a Billion-Dollar Enterprise, Targeting 6K Businesses Monthly
  96. Embracing Challenges: Featuring the Perspectives of Symantec Women in APJ – Part One
    23-Jul-19 • Comments Off on Embracing Challenges: Featuring the Perspectives of Symantec Women in APJ – Part One
  97. Tuning DLP for Success
    23-Jul-19 • Comments Off on Tuning DLP for Success
  98. Science Fiction Writers Helping Imagine Future Threats
    23-Jul-19 • Comments Off on Science Fiction Writers Helping Imagine Future Threats
  99. How Immature Security Practices Complicate Cloud Migration
    22-Jul-19 • Comments Off on How Immature Security Practices Complicate Cloud Migration
  100. 3 reasons attackers love your servers
    22-Jul-19 • Comments Off on 3 reasons attackers love your servers
  101. What You Should Know About the Equifax Data Breach Settlement
    22-Jul-19 • Comments Off on What You Should Know About the Equifax Data Breach Settlement
  102. 22nd July – Threat Intelligence Bulletin
    22-Jul-19 • Comments Off on 22nd July – Threat Intelligence Bulletin
  103. Hackers Expose Russian FSB Cyberattack Projects
    22-Jul-19 • Comments Off on Hackers Expose Russian FSB Cyberattack Projects
  104. Symantec Cloud Workload Suite Protects Across Utilities, Healthcare, Energy
    19-Jul-19 • Comments Off on Symantec Cloud Workload Suite Protects Across Utilities, Healthcare, Energy
  105. Amenaza móvil: Los atacantes pueden manipular archivos multimedia de WhatsApp y Telegram
    19-Jul-19 • Comments Off on Amenaza móvil: Los atacantes pueden manipular archivos multimedia de WhatsApp y Telegram
  106. QuickBooks Cloud Hosting Firm iNSYNQ Hit in Ransomware Attack
    19-Jul-19 • Comments Off on QuickBooks Cloud Hosting Firm iNSYNQ Hit in Ransomware Attack
  107. John Paul Stevens Was a Cryptographer
    19-Jul-19 • Comments Off on John Paul Stevens Was a Cryptographer
  108. A new Equation Editor exploit goes commercial, as maldoc attacks using it spike
    18-Jul-19 • Comments Off on A new Equation Editor exploit goes commercial, as maldoc attacks using it spike
  109. Identity Theft on the Job Market
    18-Jul-19 • Comments Off on Identity Theft on the Job Market
  110. Sym Mobile Threat: Invasores podem manipular seus arquivos de mídia do WhatsApp e Telegram
    18-Jul-19 • Comments Off on Sym Mobile Threat: Invasores podem manipular seus arquivos de mídia do WhatsApp e Telegram
  111. Targeted Ransomware: Proliferating Menace Threatens Organizations
    18-Jul-19 • Comments Off on Targeted Ransomware: Proliferating Menace Threatens Organizations
  112. Party Like a Russian, Carder’s Edition
    17-Jul-19 • Comments Off on Party Like a Russian, Carder’s Edition
  113. Why We Advocate
    17-Jul-19 • Comments Off on Why We Advocate
  114. Climbing Mountains
    16-Jul-19 • Comments Off on Climbing Mountains
  115. Zoom Vulnerability
    16-Jul-19 • Comments Off on Zoom Vulnerability
  116. How Do You Protect Users from Themselves?
    16-Jul-19 • Comments Off on How Do You Protect Users from Themselves?
  117. Meet the World’s Biggest ‘Bulletproof’ Hoster
    16-Jul-19 • Comments Off on Meet the World’s Biggest ‘Bulletproof’ Hoster
  118. Informaciją apsaugoti padės bepilotės skraidyklės
    16-Jul-19 • 0 Comment
  119. 15th July – Threat Intelligence Bulletin
    15-Jul-19 • Comments Off on 15th July – Threat Intelligence Bulletin
  120. Is ‘REvil’ the New GandCrab Ransomware?
    15-Jul-19 • Comments Off on Is ‘REvil’ the New GandCrab Ransomware?
  121. Palantir’s Surveillance Service for Law Enforcement
    15-Jul-19 • Comments Off on Palantir’s Surveillance Service for Law Enforcement
  122. Upcoming Speaking Engagements
    13-Jul-19 • Comments Off on Upcoming Speaking Engagements
  123. Clickable Endnotes to Click Here to Kill Everybody
    12-Jul-19 • Comments Off on Clickable Endnotes to Click Here to Kill Everybody
  124. 5 ways to avoid a GDPR fine
    12-Jul-19 • Comments Off on 5 ways to avoid a GDPR fine
  125. Presidential Candidate Andrew Yang Has Quantum Encryption Policy
    12-Jul-19 • Comments Off on Presidential Candidate Andrew Yang Has Quantum Encryption Policy
  126. FEC: Campaigns Can Use Discounted Cybersecurity Services
    11-Jul-19 • Comments Off on FEC: Campaigns Can Use Discounted Cybersecurity Services
  127. ‘Oto Gonderici’ Excel formula injections target Turkish victims
    11-Jul-19 • Comments Off on ‘Oto Gonderici’ Excel formula injections target Turkish victims
  128. Resetting Your GE Smart Light Bulb
    11-Jul-19 • Comments Off on Resetting Your GE Smart Light Bulb
  129. Details of the Cloud Hopper Attacks
    10-Jul-19 • Comments Off on Details of the Cloud Hopper Attacks
  130. Patch Tuesday Lowdown, July 2019 Edition
    9-Jul-19 • Comments Off on Patch Tuesday Lowdown, July 2019 Edition
  131. 16 critical vulnerabilities, some being exploited, fixed in July, 2019 Windows updates
    9-Jul-19 • Comments Off on 16 critical vulnerabilities, some being exploited, fixed in July, 2019 Windows updates
  132. CVE-2019-0888: Use-After-Free in Windows ActiveX Data Objects (ADO)
    9-Jul-19 • Comments Off on CVE-2019-0888: Use-After-Free in Windows ActiveX Data Objects (ADO)
  133. Cell Networks Hacked by (Probable) Nation-State Attackers
    9-Jul-19 • Comments Off on Cell Networks Hacked by (Probable) Nation-State Attackers
  134. Who’s Behind the GandCrab Ransomware?
    8-Jul-19 • Comments Off on Who’s Behind the GandCrab Ransomware?
  135. 8th July – Threat Intelligence Bulletin
    8-Jul-19 • Comments Off on 8th July – Threat Intelligence Bulletin
  136. 7 best practices for securing the public cloud
    4-Jul-19 • Comments Off on 7 best practices for securing the public cloud
  137. How Intercept X Advanced can help you avoid becoming a ransomware victim
    3-Jul-19 • Comments Off on How Intercept X Advanced can help you avoid becoming a ransomware victim
  138. More fantastic test results for Sophos Intercept X!
    1-Jul-19 • Comments Off on More fantastic test results for Sophos Intercept X!
  139. 1st July – Threat Intelligence Bulletin
    1-Jul-19 • Comments Off on 1st July – Threat Intelligence Bulletin
  140. BlueKeep PoC demonstrates risk of Remote Desktop exploit
    1-Jul-19 • Comments Off on BlueKeep PoC demonstrates risk of Remote Desktop exploit
  141. Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers
    28-Jun-19 • Comments Off on Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers
  142. Sophos Mobile Security earns full marks in AV-Test Android malware review
    28-Jun-19 • Comments Off on Sophos Mobile Security earns full marks in AV-Test Android malware review
  143. Breach at Cloud Solution Provider PCM Inc.
    27-Jun-19 • Comments Off on Breach at Cloud Solution Provider PCM Inc.
  144. Tracing the Supply Chain Attack on Android
    25-Jun-19 • Comments Off on Tracing the Supply Chain Attack on Android
  145. 24th June – Threat Intelligence Bulletin
    24-Jun-19 • Comments Off on 24th June – Threat Intelligence Bulletin
  146. Thumbs Up: Using Machine Learning to Improve IDA’s Analysis
    24-Jun-19 • Comments Off on Thumbs Up: Using Machine Learning to Improve IDA’s Analysis
  147. Collections Firm Behind LabCorp, Quest Breaches Files for Bankruptcy
    20-Jun-19 • Comments Off on Collections Firm Behind LabCorp, Quest Breaches Files for Bankruptcy
  148. Darbo duoda komerciniai šnipai
    3-May-19 • 0 Comment
  149. Lietuvis parašė knygą su pasaulinio garso verslo guru
    5-Mar-19 • 0 Comment
  150. „Thermo Fisher Scientific“ suteikti informacijos valdymo sertifikatai
    5-Mar-19 • 0 Comment
  151. Hey, You Get Off My Cloud
    18-Jan-19 • 0 Comment
  152. Cyber Threats Predicted To Emerge In 2019
    18-Dec-18 • 0 Comment
  153. Staying Alive In The Age Of Cyberattacks
    10-Dec-18 • 0 Comment
  154. Hackers Get Into University
    26-Oct-18 • 0 Comment
  155. It Could Still Be Light’s Out For The U.S.
    2-Sep-18 • 0 Comment
  156. Familiarity Makes Cyber Threats More Threatening
    10-Aug-18 • 0 Comment
  157. GrandCrab Grabs More Than $600,000 In Ransom Payments
    18-Jul-18 • 0 Comment
  158. Fitness App Scammers Pinpoint Where Users Work And Live
    10-Jul-18 • 0 Comment
  159. Cyber Security Expert, Paulius Petretis Reveals That Cybercrime Is Now One Of The World’s Leading Industries Leading To Even Greater Need For Cybersecurity
    25-Jun-18 • 0 Comment
  160. Cyber Security Expert, Paulius Petretis Offers Tech Savvy Tips For Travelers During The Busy Summer Vacation Season
    21-Jun-18 • 0 Comment
  161. Cybersecurity More Crucial Than Ever
    20-Jun-18 • 0 Comment
  162. How To Be Tech Savvy While Traveling
    18-Jun-18 • 0 Comment
  163. Cyber Security Expert, Paulius Petretis Reveals Information That Indicates Cyberattacks Are Getting Nastier.
    20-Apr-18 • 0 Comment
  164. One Of The Most Common Typos Can Take You Into Criminal Territory
    13-Apr-18 • 0 Comment
  165. Cyber Security Expert, Paulius Petretis Reveals How A Common Typo Can Lead To Disruption And Infection
    10-Apr-18 • 0 Comment
  166. Corporations And Governments Prepare For “Nastier Cyberattacks”
    6-Apr-18 • 0 Comment
  167. New Pathway To Monetization For Crypto Mining Criminals
    21-Mar-18 • 0 Comment
  168. Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis Uses Recent Corporate Fine As Example To Inspire Businesses Into GDPR Compliance.
    23-Feb-18 • 0 Comment
  169. Cyber Security Expert, Paulius Petretis Keeps His Customers Data Safe With State-of-the-Art EU General Data Protection Regulation Compliance Suite.
    12-Feb-18 • 0 Comment
  170. The High Cost Of Compromising Customer And Employee Data
    10-Feb-18 • 0 Comment
  171. VORAS Consulting Offers Fully Automated EU General Data Protection Regulation Compliance Suite
    10-Feb-18 • 0 Comment
  172. Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis Talks About WPA3.
    19-Jan-18 • 0 Comment
  173. New Wi-Fi Protected Access 3 Coming
    17-Jan-18 • 0 Comment
  174. Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis Talks Zombies.
    10-Jan-18 • 0 Comment
  175. When The Internet of Things (IoT) Turns Your Business Into A Zombie
    8-Jan-18 • 0 Comment
  176. Bad Rabbit Pretending To Be Something You’re Not
    5-Dec-17 • 0 Comment
  177. Director of VORAS Consulting, Paulius Petretis On Growing Dangers in The Cyber World.
    4-Dec-17 • 0 Comment
  178. In The Cyber World Dangers Lurk In Every Nook And Cranny
    2-Dec-17 • 0 Comment
  179. Director of VORAS Consulting, Paulius Petretis Reviews GDPR And Equifax Lawsuits
    1-Dec-17 • 0 Comment
  180. Would You Rather Pay For Cyber-security Or Face Endless Lawsuits
    30-Nov-17 • 0 Comment
  181. October Is Global Cyber Security Month
    15-Oct-17 • 0 Comment
  182. Director of VORAS Consulting, Paulius Petretis Writes About Wi-Fi KRACK Attack
    13-Oct-17 • 0 Comment
  183. Director of VORAS Consulting, Paulius Petretis On The New Cyber Security Regulations.
    12-Oct-17 • 0 Comment
  184. Wave of Cyber Security Regulations Starting To Spread
    10-Oct-17 • 0 Comment
  185. KRACK Disclosed In Wi-Fi Networks
    10-Oct-17 • 0 Comment
  186. Equifax Data Breach Puts UK Customers and Americans At Risk
    17-Sep-17 • 0 Comment
  187. Wanna Cry Crooks Could Be Crying Over Lousy Pay Day
    23-Aug-17 • 0 Comment
  188. Smart Homes, Smart Cars, Smart Devices, Smarter Cyber Criminals
    15-Aug-17 • 0 Comment
  189. Latest Global Ransomware Attack Hits Ukraine Hard
    10-Jul-17 • 0 Comment
  190. Cyber Security Expert, Paulius Petretis Wonders Who Will Be Forced To Join New Club
    18-Jun-17 • 0 Comment
  191. Who Will Become Members of The ‘Hacker-of-The-Month’ Club?
    15-Jun-17 • 0 Comment
  192. Director of VORAS Consulting, Paulius Petretis On Why Criminals Value Email Accounts
    13-Jun-17 • 0 Comment
  193. How Much Is An Email Account Worth To Cyber Criminals
    10-Jun-17 • 0 Comment
  194. Cyber Security Expert, Paulius Petretis Talks About Security Holes in Intel Platforms
    18-May-17 • 0 Comment
  195. If You Use Intel Platforms Your Data Is Vulnerable
    15-May-17 • 0 Comment
  196. Director of VORAS Consulting, Paulius Petretis Talks About Recent Randomware Outbreak
    8-May-17 • 0 Comment
  197. Getting Hit By WannaCry and WannaCrypt Makes You Wanna Kick Yourself
    5-May-17 • 0 Comment
  198. Cyber Security Expert, Paulius Petretis Speaks To Businesses Large, Medium and Small
    25-Apr-17 • 0 Comment
  199. Cyber Security Expert, Paulius Petretis Speaks To Businesses Large, Medium and Small.
    24-Apr-17 • 0 Comment
  200. Data Privacy Protection Laws Apply To All Businesses Large and Small
    21-Apr-17 • 0 Comment
  201. Director of VORAS Consulting, Paulius Petretis Talks About Zero-Day Vulnerabilities
    15-Apr-17 • 0 Comment
  202. Is Your Company Prepared To Prevent, Detect or Minimize a Zero-Day Exploit?
    13-Apr-17 • 0 Comment
  203. Business Expert Paulius Petretis Hits Amazon Best-Seller List
    13-Apr-17 • 0 Comment
  204. Information Security Expert Paulius Petretis Signs Publishing Deal With CelebrityPress To Release New Business Book
    13-Apr-17 • 0 Comment
  205. Failure to Be Compliant With The GDPR Will Be Costly
    24-Mar-17 • 0 Comment
  206. Time to Consider IBM Watson For Advanced Cyber Security
    14-Mar-17 • 0 Comment
  207. Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis Writes About IBM Watson.
    13-Feb-17 • 0 Comment
  208. Cyber Security Expert, Paulius Petretis Advises Action to Meet Data Protection Ruling.
    8-Feb-17 • 0 Comment
  209. May 2018 Deadline for New Data Protection Compliance
    6-Feb-17 • 0 Comment
  210. Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis On 2017 Threats.
    24-Jan-17 • 0 Comment
  211. Cyber Security Threats and Trends To Watch For This Year
    21-Jan-17 • 0 Comment
  212. Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis Writes About IBM Watson.
    14-Jan-17 • 0 Comment
  213. Let IBM Watson Be Your Company’s Cyber Security Expert
    10-Jan-17 • 0 Comment
  214. Commercial spying gives a job
    7-Jan-13 • 0 Comment
  215. Cracking The Success Code
    26-Jul-12 • 0 Comment
  216. IT Management Certificates
    10-Jan-12 • 0 Comment