How To Sidestep Popular Social ScamsEach year, internet users lose billions of dollars to online scams, using clever ploys to trick us out of our information and money. By offering prizes, referencing current events, or just creating a sense of urgency, scammers know how to get us to click when we really shouldn’t. Check out these recent scams, so you […] more…
What’s New in the World of Ransomware?Ransomware, the type of malware that can infect your computers and devices, lock you out of your own files, and demand a ransom to unlock them, is growing rapidly in both incidents and sophistication. In some cases, ransomware is even used as a cover to distract from more serious attacks, so it’s important for everyone […] more…
International Women’s Day in the ChannelI have had the privilege of working with many exceptional people over the course of my career. For International Women’s Day this year, I wanted to feature some of the dedicated and talented women I have the opportunity to work with in the Channel. The following individuals have great advice and stories that we all […] more…
Ransomware Families Use NSIS Installers to Avoid Detection, AnalysisMalware families are constantly seeking new ways to hide their code, thwart replication, and avoid detection. A recent trend for the delivery of ransomware is the use of the Nullsoft Scriptable Install System (NSIS) with an encrypted payload. The list of the most common families using this technique is diverse and includes Cerber, Locky, Teerac, Crysis, […] more…
- Apple updates Mavericks to 10.9.1, issues security fixes for Safari
- BitDefender traces MiniDuke espionage malware back to June 2011
- Microsoft Edge CVE-2018-8387 Remote Memory Corruption Vulnerability
- Apple says Feds haven’t proved they need its help unlocking iPhones
- Adobe gets second Flash zero-day patch ready 2 days early!
- Update: UCCX/ACD Server Maintenance Work
- Malicious keylogger malware found lurking in highly publicized GTA V mod
- Microsoft Windows Win32k CVE-2019-0797 Local Privilege Escalation Vulnerability
- Personal devices a security hole: Australian report
- FireEye’s $1B Mandiant Buyout: Is the Price Too High or Too Low?