Picked up xHelper ‘matryoshka’ trojan? Best to just nuke the site from orbit An Android malware package likened to a Russian matryoshka nesting doll has security researchers raising the alarm, since it appears it’s almost impossible to get rid of.……
Should a WFH SOC Be a New Reality?
In my last article, I laid out a path for how organizations could quickly get up to speed in deploying a work-from-home (WFH) security operations center (SOC) amidst the current pandemic. Since then, there has been a lot of discussion…
Cybersecurity during the pandemic: Try these security solutions for free!
In order to help global organizations of all sizes address cybersecurity during the COVID-19 pandemic, a number of vendors provide free (time-limited) access to their solutions. All of the offers below are available immediately, and they cover a number of…
Encrypted Browser for Mobile Online Protection | Avast
People are increasingly choosing their mobile phones over their computers for browsing, communication, banking and more — in fact, last year, mobile devices accounted for nearly half of worldwide web page views. As our workflows and daily lives have changed…
Organizations seeing 20/20 on need to protect customer information
Organizations seeing 20/20 on need to protect customer information john-grimm Tue, 04/07/2020 – 23:05 Once mainly a topic for math geeks and techies, encryption is now widely recognized as the technology that protects your information from exposure if it’s captured…
5 Security Mistakes Your Remote Team is Making Right Now
Businesses across the globe are now facing a new reality: working from home. Secure remote access to company resources has never been more prevalent or more essential; teams are shifting from the office to their living rooms in droves to…
Accenture purchases Revolutionary Security
Accenture has released a statement yesterday that Cybersecurity firm Revolutionary Security is now a part of Accenture Security on an official note. The financial figure involved in the purchase deal is yet to be disclosed. But highly placed sources from…
We’re offering extra resources in response to COVID-19
We are living through a situation that is unprecedented in modern history. At a moment of great professional uncertainty and personal stress, we are also being asked to be apart from each other physically. Over the last few weeks, we…
Prevention can reduce Cyber Attack loss to $1.4 Million per attack
Companies can reduce their Cyber Attack loss by up to $1.4 Million per attack if in case they have effective mitigation measures in place. This was revealed in a study conducted by Ponemon Institute in association with Deep Instinct. …
Hackers Are Bundling Cryptominer With a Seemingly Legit Zoom Installer on Unofficial Websites
Recently, Zoom has remained present in the news world owing to numerous security issues with their app. While they managed Hackers Are Bundling Cryptominer With a Seemingly Legit Zoom Installer on Unofficial Websites on Latest Hacking News. Advertise on…
Radio frequency: An invisible espionage threat to enterprises
You can’t see it, but corporate airspaces are under attack via radio frequencies. Foreign governments, competitors and cyber criminals are all conducting radio-based attacks on enterprises. These sophisticated attacks use compromised RF devices as their entry points. Cell phones, wearables,…
Cybersecurity 101 – 3 Tips to Protect Your Business
No matter what your business might be, you need to make sure that your company’s cybersecurity is top-of-the-line. Many small businesses can find themselves under attack from cyber threats simply… The post Cybersecurity 101 – 3 Tips to Protect Your…