The Streaming Wars: A Cybercriminal’s Perspective
Cyber threats aren’t relegated to the world of big businesses and large-scale campaigns. The most frequent attacks aren’t APTs and massive data breaches—they’re the daily encounters with malware and spam by everyday users. And, one of the areas where we’re most vulnerable is entertainment—particularly when we’re so used to finding everything and anything we want […] more…Critical, Wormable Bug in Windows DNS Servers Could Allow Full Infrastructure Compromise
Exploitation Would Grant Attacker Domain Administrator Rights That Could Compromise Entire Corporate Infrastructure read more more…What’s in the latest Firefox upgrade? Firefox 78 starts ESR transition for enterprises
Editor’s note: This story does not include details about Firefox version 77, which was released June 2. That update offered few changes from version 76. Mozilla last week upgraded Firefox to version 78, patching a baker’s dozen of security flaws and starting the annual process of retiring last year’s Extended Support Release (ESR) and offering […] more…Medical Care #FromHome: Telemedicine and Seniors
Medical Care From Home: Telemedicine and Seniors For weeks and even months now, millions of us have relied on the internet in ways we haven’t before. We’ve worked remotely on it, our children have schooled from home on it, and we’ve pushed the limits of our household bandwidth as families have streamed, gamed, and conferenced […] more…Magnitude exploit kit – evolution
Exploit kits are not as widespread as they used to be. In the past, they relied on the use of already patched vulnerabilities. Newer and more secure web browsers with automatic updates simply do not allow known vulnerabilities to be exploited. It was very different back in the heyday of Adobe Flash because it’s just […] more…U.S. Pushes for HTTPS on .gov Domains
The United States is taking additional steps toward serving .gov domains over encrypted connections, and this week laid out plans to preload the entire top-level domain (TLD). read more more…Local attackers can use Group Policy flaw to take over enterprise Windows systems
Microsoft fixed 129 vulnerabilities today across its entire range of software products, from Windows and Office to Visual Studio, Azure DevOps and Microsoft Apps for Android. Eleven of those flaws are critical and should be patched immediately, but one particular vulnerability could be easily overlooked and could allow hackers with local access to take full […] more…Entertainment #FromHome: How to start your own podcast
How to start your own podcast Start your own podcast? Why not? Instead of streaming someone else’s show, maybe it’s time to create one of your own. And a fine time to start a podcast it is. Podcasting once took a bit of effort to get into. The recording software, the hosting, and the equipment […] more…Safeguarding Connectivity: The Security Implications of Telecoms
Telecommunications, the exchange of information by electronic means, helps keep the world connected. You can thank modern telecom companies (think AT&T, Verizon, etc.) for that, as they’ve helped form economies and entire business infrastructures. From email and messaging to phone calls and video calls, telecoms have become an intrinsic part of our lives, allowing users […] more…Entertainment #FromHome: What to do When You’re Bored at Home
Entertainment #FromHome: What to do when you’re bored at home If your queue of movies and shows are looking a little on the “I’ve already watched that one twice already” side, this one’s for you. I’ve put together a raft of fresh shows, movies, and performances based upon my online travels and on suggestions […] more…Date Night #FromHome Ideas
Date Night #FromHome ideas “So, what movie should we watch?” The dreaded question. Twenty minutes of “mmm, maybe” later, you settle on an old episode of “The Office” and call it good. If that sounds a little too familiar, this post is for you. With so many of us having date night at home, now […] more…I did not know you could do X, Y, Z with VirusTotal
TL;DR: VirusTotal is hosting an EMEA webinar on June 4th showcasing our advanced threat enrichment and threat hunting capabilities, register for the webinar, it is free. “I did not know you could do X, Y, Z with VirusTotal”, this is the most common feedback that we hear coming from our users whenever we jump in […] more…How to Stay Protected From Malware While Online at Home
Our everyday lives are not what they used to be three months ago. Many users have made the transition from working in an office to working from home and students have adopted distance learning. But while the world focuses on one virus sweeping the globe, criminals see an opportunity to spread other types of viruses across our networks and devices. […] more…Cyberthreats on lockdown
Every year, our anti-malware research team releases a series of reports on various cyberthreats: financial malware, web attacks, exploits, etc. As we monitor the increase, or decrease, in the number of certain threats, we do not usually associate these changes with concurrent world events – unless these events have a direct relation to the cyberthreats, […] more…World Password Day 2020
Are Your Password Habits Keeping You Safe Online? Learning how to navigate our entire lives online has definitely been a steep learning curve for many of us over the last few weeks. Whether it’s working from home, helping our kids learn from home, conducting ‘wine time’ from home or even doing our Zumba classes from […] more…How to Ace Your Video Interview: Job Hunting From Home
How to Ace Your Video Interview: Job Hunting from Home, Part Two So, it’s game day. Your online video interview is about to begin, and you’re feeling good. Okay, so maybe there are just a few nerves, but you know you’ve got this. The space you’ve set up for your call is all in order […] more…More information
- How to secure your router and home network
- Rogue ‘legal’ hacker tried to sell iPhone malware for $50 million
- Microsoft Windows UPnP Service CVE-2019-1405 Local Privilege Escalation Vulnerability
- The Pentagon Scrubs a Cloud Deal and Looks to Add More AI
- Why You Should Be Dwelling on Dwell Time
- Phone and laptop encryption guide: Protect your stuff and yourself
- Don’t Be an April Fool – Protect Your Digital Assets
- Resolved: Outage: Zoom feature in Canvas is unavailable
- Is this the simple solution to password re-use?
- Maintenance: TLT Mobile Device Management (MDM) Service will be unavailable