Helping Mom & Dad: Family Video Chats
Editor’s Note: This is the third in a series of articles about how we can help our elder parents get the most out of digital life—the ways we can help them look after their finances and health online, along with how they can use the internet to keep connected with friends and family, all safely […] more…IT threat evolution Q1 2019
Targeted attacks and malware campaigns Go Zebrocy Zebrocy was first observed being used as a Sofacy backdoor in 2015. However, the collection of cases where this tool has been used mean that we consider it a subset of activity in its own right. On the basis of this threat actor’s past behaviour, we predicted last […] more…Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…McAfee Applauds “Cyber Scholarship Opportunities Act of 2017”
By Lisa Depew, Head of Industry and Academic Outreach, McAfee The “Cyber Scholarship Opportunities Act of 2017,” which is sponsored by Sens. Roger Wicker (R-Miss.) and Tim Kaine (D-Va.) and was recently approved by the Senate Commerce, Science and Transportation Committee, is welcome news for those increasingly worried about the cybersecurity workforce shortage. A report […] more…Multiplatform Boleto Fraud Hits Users in Brazil
A study conducted around June last year revealed a malware-based fraud ring that infiltrated one of Brazil’s most popular payment methods – the Boleto Bancário, or simply the boleto. While the research and analysis was already published by RSA, we’ve recently discovered that this highly profitable fraud is still out in the wild and remains […] more…Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […] more…More information
- Resolved: Web Based Login Degraded Service
- Secrets of ‘shift left’ success
- Social network analysis privacy tackled
- How to create a secure incremental offsite backup in Linux with Duplicity
- US Takes Down Huge Botnet as Spain Arrests Notorious Russian Hacker
- Adobe releases previously delayed security updates for Reader and Acrobat
- Cloud Security Firm Netskope Raises $100 Million
- Are Facebook passwords fair game for employers?
- Prosecutors Seek Six-Year Sentence for Celebrity Hacker
- Excellus Data Breach Impacts 10 Million