Great R packages for data import, wrangling, and visualization
The table below shows my favorite go-to R packages for data import, wrangling, visualization and analysis — plus a few miscellaneous tasks tossed in. The package names in the table are clickable if you want more information. To find out more about a package once you’ve installed it, type help(package = "packagename") in your R […] more…Ransomware Families Use NSIS Installers to Avoid Detection, Analysis
Malware families are constantly seeking new ways to hide their code, thwart replication, and avoid detection. A recent trend for the delivery of ransomware is the use of the Nullsoft Scriptable Install System (NSIS) with an encrypted payload. The list of the most common families using this technique is diverse and includes Cerber, Locky, Teerac, Crysis, […] more…More information
- Fortinet, Zoom Patch Multiple Vulnerabilities
- Linux Kernel CVE-2019-18805 Integer Overflow Vulnerability
- Come on Ringo! 750,000 followers deserve better… [Chet Chat Podcast 232]
- Security Posture Fatigue
- Cars should automatically call for help after crashes, EU says
- 7 Ways to Secure Magento 1
- Maintenance: Wireless will be unavailable
- 5 common ways businesses lose valuable data
- Austria Probes Claim Spyware Targeted Law Firms, Banks
- The Digital Ship is Full of Leaks. But There Are Ways to Keep it Afloat.