Sports fans protest at plans to scan their faces as they head for the match

Police to use facial recognition to match Champions League fans to ‘persons of interest’ as they arrive for the UEFA Cup final more…

Net neutrality is ‘politically motivated government overreach’

FCC chief signals assault on rules from the days of Ma Bell used by Obama to guarantee net neutrality more…

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point Software Technologies Ltd. found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack, leaving employees’ personal information vulnerable to theft. Alvaro Hoyos, chief information security officer at OneLogin, said that number does not surprise him. He said the employees might not know the […] more…

Use of DNS Tunneling for C&C Communications

– Say my name. – 127.0.0.1! – You are goddamn right. Network communication is a key function for any malicious program. Yes, there are exceptions, such as cryptors and ransomware Trojans that can do their job just fine without using the Internet. However, they also require their victims to establish contact with the threat actor […] more…

SNMP Authentication Bypass Plagues Numerous Devices

The Simple Network Management Protocol (SNMP) embedded in some Internet connected devices allows an attacker to bypass authentication by simply sending random values in specific requests, security researchers have discovered. read more more…

FIN7 Hackers Change Phishing Techniques

A recently uncovered threat group referred to as FIN7 has adopted new phishing techniques and is now using hidden shortcut files (LNK files) to compromise targets, FireEye security researchers reveal. read more more…

This Tricky Phishing Scam Manages to Impersonate Legitimate URLS

This post was written by Adam Wosotowsky. This past week, a new web-based phishing scam has emerged that manages to sneakily impersonate legitimate URLs. You heard correctly – this cyberthreat manages to appear to as a secure, trusted website, one such example being apple.com. The deceiving type of attack can be classified as a homograph attack, […] more…

Pen Testing Android Apps, Part 5: Analyzing the Heap Dump

One of the best ways to develop secure Android applications is to engage in penetration (pen) testing, in effect trying to break into your application just as an attacker might do. This is the fifth in a series of posts on pen testing Android applications. In the first, we set up the testing environment and […] more…

Cloudflare wants to secure IoT connections to the internet

Many people are worried about putting smart internet-connected devices in their homes or offices because of flaws that could allow attackers into their private networks. Web optimization and security firm Cloudflare is trying to alleviate those fears with a new service that could allow internet-of-things manufacturers to protect devices from attacks and deploy patches much […] more…

News in brief: Cassini dives into Saturn’s rings; Mexican pirate site move; Twitter under fire from spooks

Your daily round-up of some of the other stories in the news more…

Sucuri Firewall Dashboard Update

If you are a customer of ours, you may have noticed the recent updates we’ve made to our dashboard. These changes enhance your ability to manage the Sucuri Firewall and view detailed reports on the attacks being blocked from accessing your site. The dashboard has a new layout that improves both navigatio, clarity and usability […] more…

Discovery of 8,800 servers sends warning to Asian cybercriminals

Move shows the importance of international co-operation to take down cybercrime at its roots more…

Banks confident of their approach to security – but still get hit by hackers

How well does your bank look after your details? The financial institutions are pretty confident they’re doing a good job more…

Sensitive data often follows former employees out the door

There is an old cliché that says a company’s most valuable assets walk out the door at the end of the day. However, according to a recent security report, some other valuable assets are walking out the door as well, and they’re not coming back. In a survey from Osterman Research, 69 percent of organizations […] more…

Get Your Security in Shape for the Public Cloud

Summer will be here before we know it and for many that means getting off the couch and in shape, but you need a workout program that’s right for you. Boot camp, 20-minute abs, high-intensity interval training, you name it – there are a lot of options. Just make sure you pick one that fits […] more…

Why Migrate to McAfee ENS?

What are you waiting for? If you haven’t already made plans to migrate to McAfee Endpoint Security (ENS) soon, you should. But don’t just take our word for it. See what other McAfee customers say below about why they migrated their endpoint protection to McAfee ENS and what types of benefits they are experiencing. Their […] more…

2017 Antivirus News | Powered by WordPress | Fluxipress Theme | Show My IP Address, check blacklists | Free Favicon, Android and Apple Icon Generator | Bitcoin and Crypto Currency News