Energy Provider in Ukraine Targeted With Industroyer2 ICS Malware
An energy provider in Ukraine was recently targeted with a new piece of malware designed to cause damage by manipulating industrial control systems (ICS). read more more…SharkBot Android Malware Continues Popping Up on Google Play
Over the past couple of months, security researchers identified several applications in Google Play that were designed to download the SharkBot Android trojan. read more more…8 Ways to Know If Online Stores Are Safe and Legit
The explosion of e-commerce sites has changed how we shop today, providing access to millions of online stores with almost unlimited selections. Just as you would take basic precautions in a brick-and-mortar store — perhaps hiding your PIN number while paying and making sure the business is legitimate — you should also practice safe shopping […] more…Atlassian adds ‘Compass’ and ‘Atlas’ for devs, collaboration teams
Atlassian today rolled out two new software additions to its platform, one aimed at software developers, the other designed for team collaboration — and added new data-driven capabilities. Compass and Atlas evolved out of Atlassian’s Point A accelerator, a program that creates new products to address customers’ pain points. (Jira Work Management, which Atlassian launched […] more…Denonia: First Malware Targeting AWS Lambda
Researchers have come across what appears to be the first piece of malware designed to specifically target AWS Lambda environments. read more more…Smarter Homes & Gardens: Protecting the Smart Devices in Your Home
Outfitting your smart home could get a whole lot easier this year. A new industry standard called Matter aims to remove a big barrier in smart home technology, one that makes different smart home devices compatible with any smart home platform—something that wasn’t possible until now. For years, different smart home devices have run on several […] more…Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely
If you’re thinking about crypto, one of the first things you’ll want to do is get yourself a good wallet. Topping the several important things a new cryptocurrency investor needs to think about is security. Rightfully so. Cryptocurrency is indeed subject to all kinds of fraud, theft, and phishing attacks, just like the credentials and […] more…Microsoft touts new hybrid work features in updates to Windows 11
Microsoft today made a flurry of announcements about new features in Windows 11 and other apps and services, saying the tweaks are designed to better support hybrid work environments. The announcements, most of which appear to be incremental upgrades, came as part of the company’s “Windows Powers the Future of Hybrid Work” virtual event. The […] more…Lock Down & Level Up: Protect Your Online Gaming from Hackers
As a gamer, you love the stuff you’ve racked up over the years—that rare Fortnite skin from six seasons ago, a complete set of Tier 20 armor in World of Warcraft, or a Steam account loaded with your favorite titles. Hackers love it too. Because they can make money off it. Hackers have been stealing […] more…The Russian cyberattack threat might force a new IT stance
There’s a lot of fear of possible Russian cyberattacks stemming from Russia’s attempted takeover of Ukraine. Perhaps the biggest worry —and quite possibly the most likely to materialize — is that these cyberattacks will likely be finely tuned as retaliation for US financial moves against the Russian economy. The cyberattacks would be designed not to […] more…US Brands Russian Cybersecurity Firm Kaspersky ‘Security Threat’
US regulators have deemed antivirus software maker Kaspersky a “threat to national security,” a designation that will restrict its dealings in the United States. read more more…Mural acquires LUMA and launches the Collaborative Intelligence System
Visual collaboration company Mural has announced it is making its first acquisition with the purchase of Pittsburgh-based provider of learning experiences, digital resources, and certification programs, LUMA Institute. LUMA is the creator of the LUMA System, a “framework for practicing human-centered design that people can apply to tackle problems of all sizes,” which the company […] more…Smart Tips for Staying Safer Online
The recent WannaCry ransomware attack that infected more than 250,000 computers worldwide was a good reminder to everyone about staying vigilant when it comes to internet safety. After all, many of us stay connected most of the time, whether it’s on our laptops or mobile devices, giving cybercriminals a wide range of opportunities to go […] more…What is Spyware?
No one likes the feeling that someone is looking over their shoulder when they work, shop or surf online. But this is just what crooks and scammers do without our knowledge using “spyware.” Spyware is a piece of software that can covertly gather information on you. It can track the websites you visit and even […] more…Helping Mom & Dad: Family Video Chats
Editor’s Note: This is the third in a series of articles about how we can help our elder parents get the most out of digital life—the ways we can help them look after their finances and health online, along with how they can use the internet to keep connected with friends and family, all safely […] more…What Is a Crypto Wallet and How to Keep Your Wallet Secure?
A-list celebrities and social media influencers are now adding their voices to the roar of other cryptocurrency fans asking you to join them in the investments of the future. It’s impossible to deny the grip cryptocurrencies have on the world today, for better or worse. In some industries, they speed the pace of business and […] more…More information
- 5 ways data classification can prevent an education data breach
- Online ring for trading in stolen credit card data busted
- Do the Benefits of Bitcoin Outweigh the Risks?
- Raspberry Pi closes in on 2.3 million sales
- Cisco Talos: Spam at levels not seen since 2010
- Microsoft Patches Critical Flaws in Windows, Edge, Office
- The Security Industry’s Talent Shortage is a Crisis of Diversity
- New algorithm shakes up cryptography
- Chef engineer leaves the company after receiving death threats from its open source community
- How Does Tesla Build a Supercharger Charging Site?