CVE-2023-24055 Detection: Notorious Vulnerability in KeePass Potentially Exposing Cleartext Passwords Stay alert! Security researchers have discovered a notorious vulnerability posing a serious threat to users of...
Day: January 30, 2023
Smashing Security podcast #306: No Fly lists, cell phones, and the end of ransomware riches?
Smashing Security podcast #306: No Fly lists, cell phones, and the end of ransomware riches?What are prisoners getting up to with mobile phones? Why might ransomware...
ShinyHunters suspect extradited to United States from Morocco, could face 116 years in jail if convicted
ShinyHunters suspect extradited to United States from Morocco, could face 116 years in jail if convictedA 22-year-old suspected of being "Seyzo", a member of the ShinyHunters...
Driving Business Growth in Turbulent Times from CISO’s Perspective: Part II
Driving Business Growth in Turbulent Times from CISO’s Perspective: Part II Dive Into our Hubs Initiative as an Alternative to Remote Work Strategy: What’s Behind the...
Managing Cybersecurity for Critical National Infrastructure
Managing Cybersecurity for Critical National InfrastructureGeneral guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant, Artech,...
A Guide to Phishing Attacks
A Guide to Phishing AttacksThis is a good list of modern phishing techniques. Leer másSchneier on SecurityThis is a good list of modern phishing techniques.
Kevin Mitnick Hacked California Law in 1983
Kevin Mitnick Hacked California Law in 1983Early in his career, Kevin Mitnick successfully hacked California law. He told me the story when he heard about my...
Hive ransomware leak site and decryption keys seized in police sting
Hive ransomware leak site and decryption keys seized in police stingWebsites used by the Hive ransomware-as-a-service gang to extort ransoms and leak data stolen from corporate...
Friday Squid Blogging: Squid-Inspired Hydrogel
Friday Squid Blogging: Squid-Inspired HydrogelScientists have created a hydrogel “using squid mantle and creative chemistry.” As usual, you can also use this squid post to talk...
Batloader Malware Abuses Legitimate Tools, Uses Obfuscated JavaScript Files in Q4 2022 Attacks
Batloader Malware Abuses Legitimate Tools, Uses Obfuscated JavaScript Files in Q4 2022 AttacksWe discuss the Batloader malware campaigns we observed in the last quarter of 2022,...
Earth Bogle: Campaigns Target the Middle East with Geopolitical Lures
Earth Bogle: Campaigns Target the Middle East with Geopolitical LuresWe discovered an active campaign ongoing since at least mid-2022 which uses Middle Eastern geopolitical-themed lures to...
NIST Is Updating Its Cybersecurity Framework
NIST Is Updating Its Cybersecurity FrameworkNIST is planning a significant update of its Cybersecurity Framework. At this point, it’s asking for feedback and comments to its...
Myth-busting Antivirus Software Assumptions
Myth-busting Antivirus Software Assumptions The number of new viruses grows every day. In fact, McAfee registers an average of 1.1 million new malicious programs and potentially unwanted apps...
Start the New Year Right With This 3-Step Digital Detox
Start the New Year Right With This 3-Step Digital Detox Pledging to follow healthier habits is consistently the most popular new year’s resolution. That January 1st...
Everything You Need to Know About Identity Remediation
Everything You Need to Know About Identity Remediation There are no ifs, ands, or buts about it: A stolen identity creates a mess. Once they have...
How To Recognize An Online Scam
How To Recognize An Online Scam It’s been a particularly busy and colourful week, scam-wise in our household. Between 4 family members, we’ve received almost 20...
Celebrate National Download Day With This Safe Downloading Checklist
Celebrate National Download Day With This Safe Downloading Checklist Happy Download Day! (Yes, there’s a day for that.) Today is an excellent day to share downloading...
Protecting Your Privacy This Year
Protecting Your Privacy This Year If there’s a particularly clear picture that’s developed over the past couple of years, it’s that our privacy and our personal...
“Payzero” Scams and The Evolution of Asset Theft in Web3
“Payzero” Scams and The Evolution of Asset Theft in Web3In this entry, we discuss a Web3 fraud scenario where scammers target potential victims via fake smart...
40 Years of the Internet – Tips for Staying Safe Online in 2023
40 Years of the Internet – Tips for Staying Safe Online in 2023 Authored by Vonny Gamot The official 40th birthday of the internet serves as...
Your Guide to Protecting Your Credit
Your Guide to Protecting Your Credit It has a way of sneaking up on you. Credit theft and fraud. Maybe it’s happened to you. Maybe it’s...
The Case for Your Security at CES 2023
The Case for Your Security at CES 2023 As technology weaves itself into our lives in new and unexpected ways, some of it will get quite...
3 Tools to Round Out Your Privacy Protection Toolbox
3 Tools to Round Out Your Privacy Protection Toolbox It’s common practice to pull down the window shades at night. Homeowners invest in high fences. You...
The Big Difference Between Online Protection Software and Antivirus
The Big Difference Between Online Protection Software and Antivirus Authored by Dennis Pang Online protection software. Antivirus. The two words get used interchangeably often enough. But...
New Year, New You: Start Fresh With McAfee Protection Score
New Year, New You: Start Fresh With McAfee Protection Score Are you an online oversharer? Do you give your full birthday to all your online shopping...
Protecting the Universal Remote Control of Your Life—Your Smartphone
Protecting the Universal Remote Control of Your Life—Your Smartphone Aside from using it for calls and texting, we use our smartphones for plenty of things. We’re...
Vice Society Ransomware Group Targets Manufacturing Companies
Vice Society Ransomware Group Targets Manufacturing CompaniesIn this blog entry, we’d like to highlight our findings on Vice Society, which includes an end-to-end infection diagram that...
The PayPal Breach – Who Was Affected and How You Can Protect Yourself
The PayPal Breach – Who Was Affected and How You Can Protect Yourself PayPal recently notified thousands of its customers that their accounts were breached by...
What Should You Do if Your Identity Has Been Stolen?
What Should You Do if Your Identity Has Been Stolen? It’s been like this from the start—wherever people shop, do business, or simply gather together, you’ll...
Prevent advanced ransomware attacks with good email security
Prevent advanced ransomware attacks with good email securityThis report explains that phishing and social engineering attacks remain the biggest threats to organizations and how to overcome...