Cybercrime uses hidden file extensions to trick users
Symantec contributor Fred Gutierrez shows clearly in this blog post why it can be deadly to click on a .JPG file: "Cybercriminals have continuously evolved their methods throughout the ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
Symantec contributor Fred Gutierrez shows clearly in this blog post why it can be deadly to click on a .JPG file: "Cybercriminals have continuously evolved their methods throughout the ...
The Lookout Mobile Security Blog pointed out something important. Patty talked about the man who hacked hollywood: "Finding a working e-mail address was a simple process of trial and ...
Matthew Hansen, World-Herald Staff Writer just wrote a great article that illustrates what I have been warning about these last years. It starts out like this: "Imagine for a moment that ...
Marc Weber Tobias, a contributor to Forbes Magazine wrote a very interesting article: "One of our security lab team members is an ex-cyberspook who spent his career in the military doing ...
Chris Boyd over at GFI wrote: "If we survive the Mayan Apocalypse of 2012, does that mean were technically immortals? Ive no idea, but it will probably mean we dont see quite as many ...
Mike Chapple is an IT professional and assistant professor of computer applications at the University of Notre Dame. He wrote at biztechmagazine:"Are your users aware of their ...
Steve Ragan at the SecurityWeek site, wrote: "Painless PCI assessments are possible if you work for them. For most CISOs, the pain of an audit is part of the job, but it doesnt have to ...
Kevin Mitnick sent this phish over. It's a classic attempt to get you to avaid a problem, but the moment you click this link, life will become a lot more painful. So... Stop. Look. Think ...
This week, the new APWG Global Phishing Report is being today at the Anti-Phishing Working Group meeting in Prague. This report is published every six months, detailing how phishers are ...
Group-IB, a leading Russian cybercrime investigation and computer forensics company and LETA Group subsidiary, this week announced a 28-page report on the Russian cybercrime market in ...
You're in the market to replace your existing Antivirus. One of the vendors on your shortlist has a Special Bonus they are offering. They are going to give you a free high-quality ...
Fingerprint recognition has long been used to protect sensitive data on USB drives - heres another approach. This 8GB USB storage device uses voice recognition software to detect a ...
The upcoming London Olympics is undoubtedly one of the most highly-anticipated sports event of the year. It is also a favorite social engineering ploy among cybercriminals. Just recently, ...
Jaikumar Vijayan over at Computerworld observed correctly: "A recent data breach that exposed the Social Security numbers of more than 280,000 people served as yet another reminder of the ...
Bill Brenner at CSO Magazine is quoting IBM ISS Security Strategist Joshua Corman who has been on a crusade with his 8 Dirty Secrets campaign. Here they are and I'm quoting Dirty Secret ...
An ordinary piece of spam slips through the filters, and you see a gorgeous sandy beach with palm trees. It's an enticing ad for a vacation to a tropical island, basically a big picture ...
Neil Rubenking, who has been writing about antivirus for 30 years now, came up with an excellent article about what to do when your personal email or social media account. This is a ...