As the world turns to technology to track and contain the COVID-19 pandemic, could this spell the end of digital privacy rights? Health organizations and governments all over the world are using technology to communicate, track, monitor and predict the spread of COVID-19. In recent years, data has proven to be a valuable resource – [...]
About firstname.lastname@example.orgThis author has not yet filled in any details.
So far email@example.com has created 378 blog entries.
Updates for the critical-rated vulnerabilities, which are being actively exploited in the wild, are still weeks away Attackers are actively exploiting two previously undisclosed security vulnerabilities that affect all supported as well as some of the no-longer-supported versions of the Windows operating system, Microsoft announced in an out‑of‑band advisory on Monday. The security flaws, rated [...]
A prolific ransomware gang vows to dial back its campaigns and spare healthcare organizations altogether during the COVID-19 crisis. It’s no cause for celebration. When ransomware attacks a healthcare establishment, it can have a devastating effect. This was witnessed in 2017, when WannaCryptor.D (aka WannaCry) hit multiple sites across the United Kingdom’s National Health Service, [...]
How can employees stay motivated and productive while teleworking during the COVID-19 crisis? As more of the world’s population than ever before take their equipment home to begin working remotely, the challenge is for team leaders to ensure their team members remain productive, motivated and engaged, and avoid the issues of isolation. Last year, Buffer, [...]
Losing access to your account can be stressful, but there are steps you can take to get it back – and to avoid getting hacked again Many people who use social media are fans of the blue network, and by blue we mean light blue with a bird and character limit of 280 characters. Tomorrow, [...]
Not all they’re cracked up to be? Several password vaults have been found to contain vulnerabilities, both new and previously disclosed but never patched, a study says Several popular password managers contain security vulnerabilities that could be exploited to breach the walls that are supposed to keep your passwords safe, according to researchers from the [...]
Remote work can be much safer with the right cyber‑hygiene practices in place – multi‑factor authentication is one of them If you happen to be working from home due to the COVID-19 pandemic, you should beef up your logins with Multi-Factor Authentication (MFA), or sometimes called Two-Factor Authentication (2FA). That way, you don’t have to entrust [...]
ESET researchers bring to light unique obfuscation techniques discovered in the course of analyzing a new cryptomining module distributed by the Stantinko group’s botnet In the new cryptomining module we discovered and described in our previous article, the cybercriminals behind the Stantinko botnet introduced several obfuscation techniques, some of which have not yet been publicly [...]
As the COVID-19 pandemic has many organizations switching employees to remote work, a virtual private network is essential for countering the increased security risks If you’re newly working from home because of the COVID-19 outbreak, you probably have to learn some new tools and tricks very quickly now. Here we look at virtual private network [...]
The warning highlights one of the potential risks associated with revealing too much private information online The FBI’s Internet Crime Complaint Center (IC3) issued a warning yesterday about the continued threat posed by human traffickers luring victims online. Using tactics such as coercion, fraud, force, and bogus job offers, the criminals scour social media sites [...]