Your ISP, browsing history, and what to do about it

In late March, Congress approved a bill lifting restrictions imposed on ISPs last year concerning what they could do with information such as customer browsing habits, app usage history, location data, and Social Security numbers. Given that the repealed restrictions hadn’t yet come into effect, the immediate impact of the new bill is somewhat unclear. But given what typically happens with massive stores of aggregated, location-specific customer data, the prognosis is not good.

Read more

Explained: Sage ransomware

Sage is yet another ransomware that has become a common threat nowadays. Similarly to Spora, it has capabilities to encrypt files offline. The malware is actively developed and currently, we are facing outbreak of version 2.2. of this product.

Read more

Snapdragon Tightens Mobile Security

It’s a known fact people don’t secure their devices adequately and the theft of the data on just a single device can have long-term consequences for individuals, families and companies. That’s why earlier this year, Qualcomm pledged to enhance security and privacy via Snapdragon Smart Protect and recently delivered on that pledge with Snapdragon’s new 820 processor.

Read more

4 Things to Consider When Assessing Device Posture for Effective Network Access Control

Guest blogger Benny Czarny explains one of the main reasons to have a NAC system in place is to keep risky devices from connecting to your organization’s network. Unfortunately, simply purchasing a NAC solution is not going to guarantee your protection.

Read more

Leaving Laptops in Hotel Rooms: A Bad Idea

Do you keep the security of your devices in mind while out and about? Be aware of the risks, and behold a rare example of the so-called “Evil Maid” attack.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language