Jackpotting malware

| | Malware Analysis
Introduction Jackpotting malware is not well known because it exclusively targets automated teller machines (ATMs). This means it usually doesn’t directly affect a large number of people. However,... Go on to the site to read the full article ... Read More

Malware spotlight: Tarmac

| | Malware Analysis
Introduction Many people wrongly believe that Mac computers are unable to get viruses. This belief is far from true. nVir, the first virus targeting Macintosh computers, appeared in 1987 and remained... Go on to the site to read the full article ... Read More

Malware overview – Graboid

| | Malware Analysis
Introduction In October 2019, security researchers from Unit 42 at Palo Alto Networks discovered a new malware called Graboid. It is a cryptojacking malware that spreads by using containers in the... Go on to the site to read the full article ... Read More

FinCEN BEC attacks report: Analysis

| | Hacking
Introduction The Financial Crimes Enforcement Network (FinCEN) is a U.S. government institution responsible for collecting and analyzing financial information with the aim of combating financial... Go on to the site to read the full article ... Read More

Anti-spam legislation for system administrators

| | Security Awareness
Introduction Each country has its own anti-spam laws. As a result, many system administrators are confused about the laws that they need to use to find out whether emails sent to their organizations... Go on to the site to read the full article ... Read More

What does a director of fraud and identity do?

| | General Security
Introduction One can find many articles about the responsibilities of system administrators, computer crime investigators, incident responders, disaster recovery managers, directors of security,... Go on to the site to read the full article ... Read More

An overview of the new security framework for Windows 10

| | General Security
Introduction Microsoft has recently published a new security configuration framework that provides system administrators with guidelines on what steps to take to protect their Windows 10 systems. The... Go on to the site to read the full article ... Read More

How to identify and eliminate VPN vulnerabilities

Introduction In April 2019, the United States’ CERT Coordination Center released information about vulnerabilities affecting various Virtual Private Network (VPN) applications. These applications... Go on to the site to read the full article ... Read More

How to ensure Windows Server is GDPR-compliant

| | General Security
Introduction The General Data Protection Regulation (GDPR), an EU law regulating the processing of personal data, came into force on May 25th, 2018. Organizations who breach the GDPR may be subject... Go on to the site to read the full article ... Read More

What do Linux system administrators need to know about the GDPR?

| | General Security
Introduction The General Data Protection Regulation (GDPR) is a European Union law that applies not only to EU companies, but also to all companies collecting and processing the personal data of EU... Go on to the site to read the full article ... Read More