How to create a sticky cybersecurity training program

Organizations know that training employees is not only expensive but time-consuming. But when it comes to cybersecurity, training is a must. Whether you’re an organization of 50 or 50,000, this guide will show you the ropes in creating a cybersecurity training program that works from start to finish.

Read more

How to tighten security and increase privacy on your browser

Is your browser secure and private enough by design or do you need to worry about security, privacy, fingerprinting, ads, and cookies yourself?

Read more

Bring your own security (BYOS): good idea or not?

We know about BYOD. What about BYOS? Is it a good idea to Bring Your Own Security, or use your own security solution on devices that you use for work? What if they are company owned? We walk companies and employees through the pros and cons of each.

Read more

A week in security (March 12 – March 18)

A roundup of notable security news from March 12 to 18, including data theft, mobile malware, compromised clients, and more.

Read more

Malvertising on iOS pushes eyebrow-raising VPN app

A malvertising campaign on iOS is pushing a scareware page tricking Apple users into installing a free VPN app that comes with serious privacy implications.

Read more

How to secure your remote workers

Remote workers are often the weakest link in a company’s cybersecurity defenses. Find out how your company can protect its network and remote employees from threats.

Read more

Who’s Behind Your Proxy? Uncovering Bunitu’s Secrets

Is your VPN really safe? Bunitu infected PCs serve as free exit nodes.

Read more

Fake VPN Site Serves Up Keylogger

A site claiming to offer VPN services could potentially result in keyloggers being placed on the PC.

Read more

Anonymizing Traffic for your VM And Capturing Traffic

Security Level: High / Hardcore Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks AND being able to perform dynamic malware analysis and capture malicious traffic moving between the malware and the C&C. (Whew, that’s a lot of ANDs. =D) Benefits: Hide your…

Read more

Anonymizing Traffic For Your VM

Security Level: Medium Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks. Benefits: Hide your IP Protect the host system by running in a virtual environment Execute malware in a safe environment (non-traffic capture) Drawbacks: Not as easy to setup Need to gather…

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language