Friday Squid Blogging: Squid-Inspired HydrogelScientists have created a hydrogel “using squid mantle and creative chemistry.” As usual, you can also use this squid post to talk...
Month: January 2023
Batloader Malware Abuses Legitimate Tools, Uses Obfuscated JavaScript Files in Q4 2022 Attacks
Batloader Malware Abuses Legitimate Tools, Uses Obfuscated JavaScript Files in Q4 2022 AttacksWe discuss the Batloader malware campaigns we observed in the last quarter of 2022,...
Earth Bogle: Campaigns Target the Middle East with Geopolitical Lures
Earth Bogle: Campaigns Target the Middle East with Geopolitical LuresWe discovered an active campaign ongoing since at least mid-2022 which uses Middle Eastern geopolitical-themed lures to...
NIST Is Updating Its Cybersecurity Framework
NIST Is Updating Its Cybersecurity FrameworkNIST is planning a significant update of its Cybersecurity Framework. At this point, it’s asking for feedback and comments to its...
Myth-busting Antivirus Software Assumptions
Myth-busting Antivirus Software Assumptions The number of new viruses grows every day. In fact, McAfee registers an average of 1.1 million new malicious programs and potentially unwanted apps...
Everything You Need to Know About Identity Remediation
Everything You Need to Know About Identity Remediation There are no ifs, ands, or buts about it: A stolen identity creates a mess. Once they have...
Celebrate National Download Day With This Safe Downloading Checklist
Celebrate National Download Day With This Safe Downloading Checklist Happy Download Day! (Yes, there’s a day for that.) Today is an excellent day to share downloading...
How To Recognize An Online Scam
How To Recognize An Online Scam It’s been a particularly busy and colourful week, scam-wise in our household. Between 4 family members, we’ve received almost 20...
Start the New Year Right With This 3-Step Digital Detox
Start the New Year Right With This 3-Step Digital Detox Pledging to follow healthier habits is consistently the most popular new year’s resolution. That January 1st...
Protecting Your Privacy This Year
Protecting Your Privacy This Year If there’s a particularly clear picture that’s developed over the past couple of years, it’s that our privacy and our personal...
“Payzero” Scams and The Evolution of Asset Theft in Web3
“Payzero” Scams and The Evolution of Asset Theft in Web3In this entry, we discuss a Web3 fraud scenario where scammers target potential victims via fake smart...
40 Years of the Internet – Tips for Staying Safe Online in 2023
40 Years of the Internet – Tips for Staying Safe Online in 2023 Authored by Vonny Gamot The official 40th birthday of the internet serves as...
Your Guide to Protecting Your Credit
Your Guide to Protecting Your Credit It has a way of sneaking up on you. Credit theft and fraud. Maybe it’s happened to you. Maybe it’s...
The Case for Your Security at CES 2023
The Case for Your Security at CES 2023 As technology weaves itself into our lives in new and unexpected ways, some of it will get quite...
The Big Difference Between Online Protection Software and Antivirus
The Big Difference Between Online Protection Software and Antivirus Authored by Dennis Pang Online protection software. Antivirus. The two words get used interchangeably often enough. But...
3 Tools to Round Out Your Privacy Protection Toolbox
3 Tools to Round Out Your Privacy Protection Toolbox It’s common practice to pull down the window shades at night. Homeowners invest in high fences. You...
New Year, New You: Start Fresh With McAfee Protection Score
New Year, New You: Start Fresh With McAfee Protection Score Are you an online oversharer? Do you give your full birthday to all your online shopping...
Vice Society Ransomware Group Targets Manufacturing Companies
Vice Society Ransomware Group Targets Manufacturing CompaniesIn this blog entry, we’d like to highlight our findings on Vice Society, which includes an end-to-end infection diagram that...
The PayPal Breach – Who Was Affected and How You Can Protect Yourself
The PayPal Breach – Who Was Affected and How You Can Protect Yourself PayPal recently notified thousands of its customers that their accounts were breached by...
Protecting the Universal Remote Control of Your Life—Your Smartphone
Protecting the Universal Remote Control of Your Life—Your Smartphone Aside from using it for calls and texting, we use our smartphones for plenty of things. We’re...
Prevent advanced ransomware attacks with good email security
Prevent advanced ransomware attacks with good email securityThis report explains that phishing and social engineering attacks remain the biggest threats to organizations and how to overcome...
What Should You Do if Your Identity Has Been Stolen?
What Should You Do if Your Identity Has Been Stolen? It’s been like this from the start—wherever people shop, do business, or simply gather together, you’ll...
Can Apple Macs get Viruses?
Can Apple Macs get Viruses? It’s a long-standing question. Can Apple computers get viruses? While Apple does go to great lengths to keep all its devices...
The Rise and Risks of AI Art Apps
The Rise and Risks of AI Art Apps Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures,...
Attacking The Supply Chain: Developer
Attacking The Supply Chain: DeveloperIn this proof of concept, we look into one of several attack vectors that can be abused to attack the supply chain:...
Your Data—It’s the Story of You
Your Data—It’s the Story of You All your online activity creates a trail of data. And that data tells a story. The story of you. The...
ChatGPT: A Scammer’s Newest Tool
ChatGPT: A Scammer’s Newest Tool ChatGPT: Everyone’s favorite chatbot/writer’s-block buster/ridiculous short story creator is skyrocketing in fame. 1 In fact, the AI-generated content “masterpieces” (by AI...
North Korea’s Top APT Swindled $1B From Crypto Investors in 2022
North Korea's Top APT Swindled $1B From Crypto Investors in 2022Contenido de la entradaLeer másProofpoint News Feed
New Mimic Ransomware Abuses Everything APIs for its Encryption Process
New Mimic Ransomware Abuses Everything APIs for its Encryption ProcessTrend Micro researchers discovered a new ransomware that abuses the APIs of a legitimate tool called Everything,...
Data Analytics for Small Businesses: How to Manage Privacy Risks
Data Analytics for Small Businesses: How to Manage Privacy RisksPerhaps you’ve been hearing about data analytics, which is being promoted as a way for even small...