Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.
Read moreHow to Pinpoint Rogue IoT Devices on Your Network
October 12 2020Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious.
Read moreNaked Security Live – Cybersecurity tips for your own network
October 12 2020Here's the latest Naked Security Live video - enjoy (and please share with your friends)!
Read moreMicrosoft Uses Trademark Law to Disrupt Trickbot Botnet
October 12 2020Microsoft Corp. has executed a coordinated legal sneak attack in a bid to disrupt the malware-as-a-service botnet Trickbot, a global menace that has infected millions of computers and is...
Read moreHacking Apple for Profit
October 12 2020Five researchers hacked Apple Computer’s networks — not their products — and found fifty-five vulnerabilities. So far, they have received $289K. One of the worst of all the bugs they...
Read moreSecurity and DevOps
October 12 2020Report: U.S. Cyber Command Behind Trickbot Tricks
October 10 2020A week ago, KrebsOnSecurity broke the news that someone was attempting to disrupt the Trickbot botnet, a malware crime machine that has infected millions of computers and is often...
Read moreFriday Squid Blogging: Saving the Humboldt Squid
October 9 2020Genetic research finds the Humboldt squid is vulnerable to overfishing. As usual, you can also use this squid post to talk about the security stories in the news that I...
Read moreLike most such mobile malware, the new one doesn't encrypt data but attempts to make an infected system impossible to use, Microsoft says.
Read moreApple Pays Bug Bounty to Enterprise Network Researchers
October 9 2020So far, the company has doled out $288,000 to five researchers who, in three months, found 55 vulnerabilities in its corporate infrastructure.
Read more
Recent Comments