95% of websites in 10 new TLDs are suspicious
Much has changed since the early days of the Internet when the Web had only six common top level domains (TLDs). Back then, what most consumers and businesses encountered were …
Snoopers’ Charter will cause extreme rise in business costs
The UK Government’s Investigatory Powers Bill, dubbed ‘Snoopers’ Charter’ by critics, has already been met with contention from tech giants, Google, Facebook and Microsoft, …
Verizon and Splunk deliver actionable threat intelligence
Verizon Enterprise Solutions launched its Data Breach Investigations Report (DBIR) app for Splunk software. The new free downloadable app helps take the guess work out of …
What’s burning up resources for IT pros during the summer?
IT pros felt the heat this summer as they kept networks humming along for remote workers on vacation. Over the summer months, most organizations see a significant expansion in …
Adware installer gives itself permission to access Mac users’ keychain
“Malwarebytes researcher Adam Thomas has made an interesting discovery: an adware installer created by Genieo, a well-known distributor of unwanted software, is taking …
An emerging global threat: BEC scams hitting more and more businesses
As more and more victims come forward, and the losses sustained by firms in the US and around the world passed the billion dollar mark, the FBI is once again warning …
Five years of hardware and software threat evolution
McAfee Labs commemorates the five-year anniversary of the Intel-McAfee union by comparing what researchers thought would happen beginning in 2010 with what actually happened …
Ashley Madison-themed blackmail, data deletion scams hitting inboxes
In the wake of the Ashley Madison hack and consequent data leaks, blackmailers and scammers are doing their best to extract as much money and information as it’s …
49 new Regin backdoor modules discovered
“Since Symantec and Kaspersky Lab researchers presented their findings on the Regin backdoor late last year, there has been only one additional publicly revealed …
How Linux Foundation sysadmins secure their workstations
Sysadmins around the world have been provided with another helpful guide on how to go about hardening their Linux workstations, as Konstantin Ryabitsev, Director of …
Hope is not a strategy, we need more healthy paranoia
35 percent of security experts believe leadership within their organization lacks a healthy paranoia, with 21 percent of leadership “relying on hope as a strategy” …
Should the removal of personal info posted online be a human right?
69% of online Americans agree that the ‘Right to be Forgotten’ should be a human right, 29% think it allows for censorship. Only 16% think the ‘right to be …
Featured news
Resources
Don't miss
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade
- Why silent authentication is the smarter way to secure BYOD
- What Fortune 100s are getting wrong about cybersecurity hiring
- SonicWall SMA devices persistently infected with stealthy OVERSTEP backdoor and rootkit