“Payzero” Scams and The Evolution of Asset Theft in Web3In this entry, we discuss a Web3 fraud scenario where scammers target potential victims via fake smart...
Month: January 2023
40 Years of the Internet – Tips for Staying Safe Online in 2023
40 Years of the Internet – Tips for Staying Safe Online in 2023 Authored by Vonny Gamot The official 40th birthday of the internet serves as...
Protecting Your Privacy This Year
Protecting Your Privacy This Year If there’s a particularly clear picture that’s developed over the past couple of years, it’s that our privacy and our personal...
Your Guide to Protecting Your Credit
Your Guide to Protecting Your Credit It has a way of sneaking up on you. Credit theft and fraud. Maybe it’s happened to you. Maybe it’s...
3 Tools to Round Out Your Privacy Protection Toolbox
3 Tools to Round Out Your Privacy Protection Toolbox It’s common practice to pull down the window shades at night. Homeowners invest in high fences. You...
The Big Difference Between Online Protection Software and Antivirus
The Big Difference Between Online Protection Software and Antivirus Authored by Dennis Pang Online protection software. Antivirus. The two words get used interchangeably often enough. But...
New Year, New You: Start Fresh With McAfee Protection Score
New Year, New You: Start Fresh With McAfee Protection Score Are you an online oversharer? Do you give your full birthday to all your online shopping...
The Case for Your Security at CES 2023
The Case for Your Security at CES 2023 As technology weaves itself into our lives in new and unexpected ways, some of it will get quite...
Vice Society Ransomware Group Targets Manufacturing Companies
Vice Society Ransomware Group Targets Manufacturing CompaniesIn this blog entry, we’d like to highlight our findings on Vice Society, which includes an end-to-end infection diagram that...
The PayPal Breach – Who Was Affected and How You Can Protect Yourself
The PayPal Breach – Who Was Affected and How You Can Protect Yourself PayPal recently notified thousands of its customers that their accounts were breached by...
Protecting the Universal Remote Control of Your Life—Your Smartphone
Protecting the Universal Remote Control of Your Life—Your Smartphone Aside from using it for calls and texting, we use our smartphones for plenty of things. We’re...
The Rise and Risks of AI Art Apps
The Rise and Risks of AI Art Apps Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures,...
Can Apple Macs get Viruses?
Can Apple Macs get Viruses? It’s a long-standing question. Can Apple computers get viruses? While Apple does go to great lengths to keep all its devices...
Prevent advanced ransomware attacks with good email security
Prevent advanced ransomware attacks with good email securityThis report explains that phishing and social engineering attacks remain the biggest threats to organizations and how to overcome...
What Should You Do if Your Identity Has Been Stolen?
What Should You Do if Your Identity Has Been Stolen? It’s been like this from the start—wherever people shop, do business, or simply gather together, you’ll...
Attacking The Supply Chain: Developer
Attacking The Supply Chain: DeveloperIn this proof of concept, we look into one of several attack vectors that can be abused to attack the supply chain:...
Your Data—It’s the Story of You
Your Data—It’s the Story of You All your online activity creates a trail of data. And that data tells a story. The story of you. The...
ChatGPT: A Scammer’s Newest Tool
ChatGPT: A Scammer’s Newest Tool ChatGPT: Everyone’s favorite chatbot/writer’s-block buster/ridiculous short story creator is skyrocketing in fame. 1 In fact, the AI-generated content “masterpieces” (by AI...
North Korea’s Top APT Swindled $1B From Crypto Investors in 2022
North Korea's Top APT Swindled $1B From Crypto Investors in 2022Contenido de la entradaLeer másProofpoint News Feed
New Mimic Ransomware Abuses Everything APIs for its Encryption Process
New Mimic Ransomware Abuses Everything APIs for its Encryption ProcessTrend Micro researchers discovered a new ransomware that abuses the APIs of a legitimate tool called Everything,...
Data Analytics for Small Businesses: How to Manage Privacy Risks
Data Analytics for Small Businesses: How to Manage Privacy RisksPerhaps you’ve been hearing about data analytics, which is being promoted as a way for even small...
5 ways private cloud enhances data privacy for businesses
5 ways private cloud enhances data privacy for businessesContributed by April Miller, Senior Writer for Rehack.com. Businesses rely on data, but much of this information requires privacy....
3 Ways ChatGPT Will Change Infosec in 2023
3 Ways ChatGPT Will Change Infosec in 2023OpenAI's chatbot has the promise to revolutionize how security practitioners work.Leer másDark ReadingOpenAI's chatbot has the promise to revolutionize...
Why Your Board Of Directors Should Focus On Building Your CISO’s Self-Resilience
Why Your Board Of Directors Should Focus On Building Your CISO’s Self-ResilienceContenido de la entradaLeer másProofpoint News Feed
Unconsidered benefits of a consolidation strategy every CISO should know
Unconsidered benefits of a consolidation strategy every CISO should knowPete has 32 years of Security, Network, and MSSP experience and has been a hands-on CISO for...
Cisco IOS and IOS XE Software DHCP Version 4 Relay Denial of Service Vulnerability
Cisco IOS and IOS XE Software DHCP Version 4 Relay Denial of Service VulnerabilityA vulnerability in the DHCP option 82 encapsulation functionality of Cisco IOS Software...
GUEST ESSAY: The role ‘deep learning’ AI can play relieving security teams of debilitating stress
GUEST ESSAY: The role ‘deep learning’ AI can play relieving security teams of debilitating stressThe cybersecurity profession can be very rewarding, but at the same time...
Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability
Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Denial of Service VulnerabilityA vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1)...
Cisco IOS and IOS XE Software DHCP Version 4 Relay Heap Overflow Denial of Service Vulnerability
Cisco IOS and IOS XE Software DHCP Version 4 Relay Heap Overflow Denial of Service VulnerabilityA vulnerability in the DHCP option 82 encapsulation functionality of Cisco...
Cisco IOS and IOS XE Software DHCP Version 4 Relay Reply Denial of Service Vulnerability
Cisco IOS and IOS XE Software DHCP Version 4 Relay Reply Denial of Service VulnerabilityA vulnerability in the Cisco IOS Software and Cisco IOS XE Software...