One in 25 Searchable ‘Black Friday’ Apps Blacklisted as Malicious, Finds Report

Black Friday is a big day for shoppers. In 2016, 154 million consumers shopped over Thanksgiving weekend and spent $9.36 billion, constituting a year-over-year increase of 16.4 percent. More than half of that money spent ($5.27 billion) occurred online. Building on those figures, Black Friday 2017 looks like it will be even bigger than in … Read More The post One in 25 Searchable ‘Black Friday’ Apps Blacklisted as Malicious, Finds Report appeared first on The State of Security.
Read more

Cybercrime Laws: What Internet Fraud Victims Need to Know

As the Internet continues to be an important part of our lives, it also becomes a more dangerous avenue for cybercrime. The risk increases as the massive online community’s use of the Internet becomes more rampant. And despite the public being aware of cybersecurity issues, anonymous online criminals are able find more victims and creative … Read More The post Cybercrime Laws: What Internet Fraud Victims Need to Know appeared first on The State of Security.
Read more

Phishing Testing: Building Your Human Firewall

Phishing is becoming a major threat vector for organizations all around the world. Phishing is the exercise of sending illegitimate emails designed to elicit a response from the end user, whether that’s clicking on a link that infects them with malware or tricking the user into volunteering information that they normally would not provide like … Read More The post Phishing Testing: Building Your Human Firewall appeared first on The State of Security.
Read more

Blockchain 101: How This Emerging Technology Works

Unless you’ve been living in Slab City or off the grid for a while, you’ve probably heard this year’s omnipresent buzzword ‘blockchain.’ But perhaps you’re a bit clueless as to what this newer technology entails. In a recent HSBC survey of 12,000 respondents in 11 countries, 80 percent of people could not explain how blockchain … Read More The post Blockchain 101: How This Emerging Technology Works appeared first on The State of Security.
Read more

The Case of The Dark Web DDoS – Part 2

In part one of this two-part series, I described what we know about the September 14 attack against the drug sites on the Tor network. To review: The attack simultaneously took down 11 drug sites on the dark web, yet traffic patterns were unaffected. The site administrators indicated a problem on a public forum; and There was … Read More The post The Case of The Dark Web DDoS – Part 2 appeared first on The State of Security.
Read more

The Case of The Dark Web DDoS – Part 1

Think of all the recent DDoS attacks. They all seem to share the common trait of bad guys disrupting the normal flow of data against a legitimate business. Sometimes, these attacks are used for revenge, and other times, they are used for ransom. Sometimes, however, the bad guys become the targets. This is the story … Read More The post The Case of The Dark Web DDoS – Part 1 appeared first on The State of Security.
Read more

What is Red Hat Linux?

Red Hat is one of the most powerful and distinct operating systems existing in the Linux environment. It is based on the open source-code concept and is freely available for download. However, the verbatim copying of Red Hat is forbidden. So, what exactly is Red Hat Linux? Well truthfully, “Red Hat Linux” (by this name) The post What is Red Hat Linux? appeared first on Phoenix TS.
Read more

October 2017: The Month in Ransomware

Ransomware activity didn’t skyrocket last month, but there was definitely a substantial increase compared to September. Perhaps the most serious wake-up call was the onset of BadRabbit, a Petya-like culprit going on a rampage in Eastern Europe. A likely successor of the Cerber ransomware dubbed Magniber started making the rounds via the Magnitude exploit kit. … Read More The post October 2017: The Month in Ransomware appeared first on The State of Security.
Read more
Page 1 of 1212345...10...Last »