10 Top Tools for Threat Hunters from Black Hat USA 2018

10 Top Tools for Threat Hunters from Black Hat USA 2018

| | SBN News, security
Check out our short reviews of useful tools for threat intelligence researchers and threat hunters presented at Black Hat USA 2018 in Las Vegas: ... Read More
Supply Chain Attacks: Shipping the Exploits

Supply Chain Attacks: Shipping the Exploits

| | SBN News, security
Malware inserted along the business supply chain can do far more damage than directly compromising a single company’s network. Local browsers, used by vendors and customers alike, open the door for attackers ... Read More
How to Block ALL Cryptocurrency Miners From Hijacking Your Browser

How to Prevent Browser “Cryptojacking”

Cryptominers are making bank by hijacking local browsers and hogging CPU resources. They are also are getting better at evading detection. How can you protect yourself and your organization against cryptojacking? ... Read More
How the PageUp Hack is Highlighting HR's Data Protection Problems

How the PageUp Hack is Highlighting HR’s Data Protection Problems

The recent data breach at global Human Resources services provider PageUp may have impacted millions of job seekers. The Authentic8 Blog highlights how the PageUp hack is symptomatic for HR's cybersecuity problem ... Read More
Rogue WiFi Access Points: Would You Know the Difference?

Rogue WiFi Access Points: Would You Know the Difference?

| | security
When traveling, at trade shows or when visiting a client or customer, a wireless access point (AP) can offer the most convenient way to connect to the web. And the most dangerous, too: beware the "rogue" access point ... Read More
Hoodwinked: Why Our Eyes Won't Protect Us Against Phishing and Fake Websites

Hoodwinked: Why Our Eyes Won’t Protect Us Against Phishing and Fake Websites

Our eyes were the gatekeepers between fact and fiction - then the internet came along. The visual information we encounter and interact with on the web is digitally created and manipulated - and we’re not ready for it ... Read More
The Silo Sessions #05: Browser Talk with RSA Visitors and Exhibitors

Browser Security: Pwned and Exposed

Supposedly secure browsers are making headlines, but not in a good way. Their makers cannot gloss over the security weaknesses any longer. * Browser makers should be concerned, very concerned. Last week, a security researcher with software firm AdGuard called out five malicious ad blocking extensions in the Google Chrome ... Read More
SSL Certificates Boost Security? Many Don’t.

SSL Certificates Boost Security? Many Don’t.

| | SBN News, security
Massive disruption is coming to websites that use digital certificates issued by Symantec or the brands that it has owned. Effective this week, two major browsers will not accept any SSL certificates issued by Symantec that were issued before June 2016 ... Read More
HTTPS: Beware the False Sense of Security

HTTPS: Beware the False Sense of Security

| | Privacy, security
HTTPS is the protocol that is getting a lot of attention these days. As more browsers migrate toward supporting it in meaningful ways — like by not connecting to sites that do not offer it — it would be easy for a user to think that once HTTPS has been ... Read More
The Six Biggest Inside Threats to Law Firm IT

The Six Biggest Inside Threats to Law Firm IT

by Jordan McQuown, CIO, LogicForce Incidental actions of insiders pose a threat to law firm IT that is often underestimated. What are the six biggest internal cybersecurity risks for your law firm, and how can you counter them? ... Read More
Loading...