Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.
Read moreA 7-Step Cybersecurity Plan for Healthcare Organizations
October 12 2020With National Cybersecurity Awareness Month shining a spotlight on the healthcare industry, security pros share best practices for those charged with protecting these essential organizations.
Read moreEven if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.
Read moreHow to Pinpoint Rogue IoT Devices on Your Network
October 12 2020Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious.
Read moreNaked Security Live – Cybersecurity tips for your own network
October 12 2020Here's the latest Naked Security Live video - enjoy (and please share with your friends)!
Read moreMicrosoft Uses Trademark Law to Disrupt Trickbot Botnet
October 12 2020Microsoft Corp. has executed a coordinated legal sneak attack in a bid to disrupt the malware-as-a-service botnet Trickbot, a global menace that has infected millions of computers and is...
Read moreHacking Apple for Profit
October 12 2020Five researchers hacked Apple Computer’s networks — not their products — and found fifty-five vulnerabilities. So far, they have received $289K. One of the worst of all the bugs they...
Read moreSecurity and DevOps
October 12 2020Report: U.S. Cyber Command Behind Trickbot Tricks
October 10 2020A week ago, KrebsOnSecurity broke the news that someone was attempting to disrupt the Trickbot botnet, a malware crime machine that has infected millions of computers and is often...
Read moreFriday Squid Blogging: Saving the Humboldt Squid
October 9 2020Genetic research finds the Humboldt squid is vulnerable to overfishing. As usual, you can also use this squid post to talk about the security stories in the news that I...
Read more
Recent Comments