What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find them.
What did we learn about cybercrime in the quarterly Labs CTNT report? Malicious cryptomining has taken over in 2018, and it’s leaving all other malware families behind.
It’s been a particularly ghoulish year in cybersecurity, from Russian hacks to ransomware outbreaks. The bad boogey man in the black hoodie has been pulling one over the collective public. It’s dark and creepy, but users refuse to stop peeking behind the door. It’s enough to make even the most grizzled IT admin run for…
An old Microsoft Office feature has been brought back to the forefront as way to distribute malware without relying on macros or exploits.