Dark Web Phishing Kits: Cheap, plentiful and ready to trick you

Dark Web Phishing Kits: Cheap, plentiful and ready to trick you

Spam email is a part of daily life on the internet. Even the best junk mail filters will still allow through certain suspicious looking messages. If an illegitimate email tries to persuade you to click a link and enter personal information, then it is classified as a phishing attack. Phishing ... Read More
5 lessons public wi-fi can teach us about cybersecurity

5 lessons public wi-fi can teach us about cybersecurity

Free, public Wi-Fi is now crucial in ensuring people stay connected where a secure network is absent or mobile data is unavailable. While the advantages of flexible internet access are obvious, the dangers are often less clear. By now, most of us are aware that these networks can pose a ... Read More
Browser Security: What's Up with WASM?

Browser Security: What’s Up with WASM?

WebAssembly, a newer type of “low-level” code that can be run by modern web browsers, is aimed at improving the web experience. The catch: Regular browsers execute such code locally. WebAssembly - merely a faster way for web-borne exploits to reach the local browser? * WebAssembly (WASM) is currently supported ... Read More
8 Things That Go Bump In Your Browser. Not Only at Night.

8 Things That Go Bump In Your Browser. Not Only at Night.

Abandon hope all ye who launch your browser. Here’s how to turn any old day into an inescapable, never-ending Halloween nightmare. Be prepared to get scared out of your wits ... Read More
10 Top Tools for Threat Hunters from Black Hat USA 2018

10 Top Tools for Threat Hunters from Black Hat USA 2018

| | SBN News, security
Check out our short reviews of useful tools for threat intelligence researchers and threat hunters presented at Black Hat USA 2018 in Las Vegas: ... Read More
Supply Chain Attacks: Shipping the Exploits

Supply Chain Attacks: Shipping the Exploits

| | SBN News, security
Malware inserted along the business supply chain can do far more damage than directly compromising a single company’s network. Local browsers, used by vendors and customers alike, open the door for attackers ... Read More
How to Block ALL Cryptocurrency Miners From Hijacking Your Browser

How to Prevent Browser “Cryptojacking”

Cryptominers are making bank by hijacking local browsers and hogging CPU resources. They are also are getting better at evading detection. How can you protect yourself and your organization against cryptojacking? ... Read More
How the PageUp Hack is Highlighting HR's Data Protection Problems

How the PageUp Hack is Highlighting HR’s Data Protection Problems

The recent data breach at global Human Resources services provider PageUp may have impacted millions of job seekers. The Authentic8 Blog highlights how the PageUp hack is symptomatic for HR's cybersecuity problem ... Read More
Rogue WiFi Access Points: Would You Know the Difference?

Rogue WiFi Access Points: Would You Know the Difference?

| | security
When traveling, at trade shows or when visiting a client or customer, a wireless access point (AP) can offer the most convenient way to connect to the web. And the most dangerous, too: beware the "rogue" access point ... Read More
Hoodwinked: Why Our Eyes Won't Protect Us Against Phishing and Fake Websites

Hoodwinked: Why Our Eyes Won’t Protect Us Against Phishing and Fake Websites

Our eyes were the gatekeepers between fact and fiction - then the internet came along. The visual information we encounter and interact with on the web is digitally created and manipulated - and we’re not ready for it ... Read More
Loading...