Upcoming Speaking EngagementsThis is a current list of where and when I am scheduled to speak: I’m speaking as part of a Geneva Centre for Security...
Author: admin
Massive Data Breach at Uber
Massive Data Breach at UberIt’s big: The breach appeared to have compromised many of Uber’s internal systems, and a person claiming responsibility for the hack sent...
Friday Squid Blogging: Mayfly Squid
Friday Squid Blogging: Mayfly SquidThis is surprisingly funny. As usual, you can also use this squid post to talk about the security stories in the news...
Credit Card Fraud That Bypasses 2FA
Credit Card Fraud That Bypasses 2FASomeone in the UK is stealing smartphones and credit cards from people who have stored them in gym lockers, and is...
Large-Scale Collection of Cell Phone Data at US Borders
Large-Scale Collection of Cell Phone Data at US BordersThe Washington Post is reporting that the US Customs and Border Protection agency is seizing and copying cell...
Botched Crypto Mugging Lands Three U.K. Men in Jail
Botched Crypto Mugging Lands Three U.K. Men in JailThree men in the United Kingdom were arrested this month for attempting to assault a local man and...
New Ponemon Institute Study Finds that Cyberattacks Cause More Than Twenty Percent of Impacted Healthcare Organizations to Experience Increased Mortality Rates
New Ponemon Institute Study Finds that Cyberattacks Cause More Than Twenty Percent of Impacted Healthcare Organizations to Experience Increased Mortality RatesContenido de la entradaLeer másProofpoint News...
Over two fifths of security professionals are investing in endpoint security
Over two fifths of security professionals are investing in endpoint securityCyber Security Hub research finds that 63 percent of cyber security professionals said that their company...
2K game support hacked to email RedLine info-stealing malware
2K game support hacked to email RedLine info-stealing malwareHackers have compromised the support system of American video game publisher 2K and now are sending support tickets...
Deadly Digital Dares: The Blackout Challenge on TikTok
Deadly Digital Dares: The Blackout Challenge on TikTok The social network TikTok is chockfull of interesting, fun, laugh-out-loud videos shared by creators worldwide. Kids, as well...
Fake Security App Found Abuses Japanese Payment System
Fake Security App Found Abuses Japanese Payment System Authored by SangRyol Ryu and Yukihiro Okutomi McAfee’s Mobile Research team recently analyzed new malware targeting NTT DOCOMO...
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like the internet follows us wherever we go nowadays, whether it tags along...
The Feeling of Safety with McAfee+
The Feeling of Safety with McAfee+ Safety has a feeling all its own, and that’s what’s at the heart of McAfee+. We created McAfee+ so people...
Watch Out for These 3 Online Job Scams
Watch Out for These 3 Online Job Scams If you recently found yourself looking for a new job, you are far from alone. According to the Institute of...
Steer Clear of the “Pay Yourself Scam” That’s Targeting Online Bank Accounts
Steer Clear of the “Pay Yourself Scam” That’s Targeting Online Bank Accounts An old banking scam has a new look. And it’s making the rounds again. ...
What You Do Now To Protect Your Child From Cyberbullying
What You Do Now To Protect Your Child From Cyberbullying I can’t tell you how many times over my 25 years of parenting that I’ve just...
#WSPD Creating hope through action with The Jordan Legacy
#WSPD Creating hope through action with The Jordan Legacy *TW: Mentions Suicide Our passion for protecting people doesn’t stop with online safety. We deeply care for...
The cyberattack with the most negative impact to patient care: ransomware
The cyberattack with the most negative impact to patient care: ransomwareContenido de la entradaLeer másProofpoint News Feed
Windows 11 22H2 is released, here are the new features
Windows 11 22H2 is released, here are the new featuresMicrosoft has released the next version of Windows 11 called "22H2," otherwise known as the Windows 11 2022...
‘This is the jungle’: Law enforcement slowly waking up to the threat of DeFi exploits
‘This is the jungle’: Law enforcement slowly waking up to the threat of DeFi exploitsContenido de la entradaLeer másProofpoint News Feed
Hive ransomware claims attack on New York Racing Association
Hive ransomware claims attack on New York Racing AssociationThe Hive ransomware operation claimed responsibility for an attack on the New York Racing Association (NYRA), which previously...
Hybrid Cloud Changes the Game for Security
Hybrid Cloud Changes the Game for SecurityEmbracing New Technologies to Gain Agility, Rapid App Delivery Is Good BusinessEmbracing new technologies to gain benefits such as increased...
‘Cyber insecurity’ in healthcare is leading to increased patient mortality rates
‘Cyber insecurity’ in healthcare is leading to increased patient mortality ratesContenido de la entradaLeer másProofpoint News Feed
Phishing scheme targeting Mideast researchers uses ‘herd mentality’ approach to dupe victims
Phishing scheme targeting Mideast researchers uses 'herd mentality' approach to dupe victimsContenido de la entradaLeer másProofpoint News Feed
Windows 11 22H2 adds kernel exploit protection to security baseline
Windows 11 22H2 adds kernel exploit protection to security baselineMicrosoft has released the final version of security configuration baseline settings for Windows 11, version 22H2, downloadable...
Windows 10 KB5017380 preview update released with new FIDO2 features
Windows 10 KB5017380 preview update released with new FIDO2 featuresMicrosoft has released the optional KB5017380 Preview cumulative update for Windows 10 20H2, Windows 10 21H1, and...
A Post-exploitation Look at Coinminers Abusing WebLogic Vulnerabilities
A Post-exploitation Look at Coinminers Abusing WebLogic VulnerabilitiesThis blog entry details how Trend Micro Cloud One™ – Workload Security and Trend Micro Vision One™ effectively detected...
What Industry Is Most Vulnerable to a Cyberattack?
What Industry Is Most Vulnerable to a Cyberattack?Why the Lack of Prioritization, Oversight, and Control of Third-Party Access Impacts EveryoneThe data shows that every industry contains...
Iranian Attackers Upgrade Social Engineering Tactics
Iranian Attackers Upgrade Social Engineering TacticsContenido de la entradaLeer másProofpoint News Feed
Why Would Palo Alto Networks Want Startup Apiiro for $600M?
Why Would Palo Alto Networks Want Startup Apiiro for $600M?Palo Alto Networks' 19-Month Acquisition Dry Spell Soon to Be Over, Calcalist SaysPalo Alto Networks has been...
















