Organizations know that training employees is not only expensive but time-consuming. But when it comes to cybersecurity, training is a must. Whether you’re an organization of 50 or 50,000, this guide will show you the ropes in creating a cybersecurity training program that works from start to finish.
Is your browser secure and private enough by design or do you need to worry about security, privacy, fingerprinting, ads, and cookies yourself?
We know about BYOD. What about BYOS? Is it a good idea to Bring Your Own Security, or use your own security solution on devices that you use for work? What if they are company owned? We walk companies and employees through the pros and cons of each.
A malvertising campaign on iOS is pushing a scareware page tricking Apple users into installing a free VPN app that comes with serious privacy implications.
Is your VPN really safe? Bunitu infected PCs serve as free exit nodes.
Security Level: High / Hardcore Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks AND being able to perform dynamic malware analysis and capture malicious traffic moving between the malware and the C&C. (Whew, that’s a lot of ANDs. =D) Benefits: Hide your…
Security Level: Medium Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks. Benefits: Hide your IP Protect the host system by running in a virtual environment Execute malware in a safe environment (non-traffic capture) Drawbacks: Not as easy to setup Need to gather…