December 10, 2018 - Phishing is more problematic on smartphones than on desktops. Not only that, approaches to handling phishing attacks on mobile are quite different because their techniques are also different. So, how can users sniff out a mobile phish? Let us count the ways.
December 5, 2018 - Where are all these major breaches coming from? What should we do if we are a victim? And how can we as a company prevent them?
November 30, 2018 - Marriott disclosed a large-scale data breach impacting up to 500 million customers who have stayed at a Starwood-branded hotel within the last four years.
November 20, 2018 - Consumer DNA testing kits were a top holiday present last season, and are expected to be big sellers again. But should you think twice before hitting the buy button? What's really happening with all your genetic data? We take a deep dive into all the areas of concern—plus what the testing companies are getting right—when it comes to the security of your DNA and the privacy of your sensitive personal information.
November 16, 2018 - When considering an automation strategy, business representatives must be aware of any security risks involved. Here are six automating concerns network admins and other IT staff should keep in mind.
November 14, 2018 - Fashionable and functional. These are the makings of smart jewelry. They aren’t secure, yet some are used to secure user data and online accounts. Should you still buy one?
November 14, 2018 - There’s a newer, more sophisticated banking Trojan in town attempting to penetrate business networks and giving Emotet a run for its money. And its name is TrickBot. Learn how this threat is giving organizations a run for their money.
November 9, 2018 - A quick introduction to Process Hacker which is a powerful tool that can be used for troubleshooting, debugging, and reverse engineering.
November 8, 2018 - Organizations know that training employees is not only expensive but time-consuming. But when it comes to cybersecurity, training is a must. Whether you’re an organization of 50 or 50,000, this guide will show you the ropes in creating a cybersecurity training program that works from start to finish.
November 6, 2018 - Transport and logistics are vital infrastructure, because we need them to deliver our daily necessities, but who is responsible for protecting them?