Protecting AWS infrastructure: Seven best practices
The Deep Root leak highlighted the importance of proper cloud security configuration for AWS.
The Deep Root leak highlighted the importance of proper cloud security configuration for AWS.
“Anything I can do to prove that we don’t behave maliciously I will do it.” ~Eugene Kaspersky~
The cyberattack is coming in the form of ransomware linked to a variation named Petya.
According to ZDNet, the process of hacking Windows 10 S was harder than expected.
CUJO does a great job of blocking sites and hacking attempts across all your connected devices to help keep your network safe from malware and hacking.
An increase in ransomware and viruses is coming for Mac users.
Be careful out there in social media land, not everything is as it seems!
A decent antivirus software costs around $39-$55. Not that expensive, right? So why do people still rely on free antivirus?
This operation is run by Rafotech, a large digital marketing agency based in Beijing.
The company says they are investigating further and are involving law enforcement.
According to the New York Times, the Pentagon is worried that hackers are ramping up their social media presence in order to break into DoD computers.
Chipotle was hit with the E. coli bug not too long ago, now they’re dealing with a POS malware bug.
This seems to be more of an issue of lazy development rather than intended maliciousness.
Luckily, HandBrake’s forums have provided details on how to manually remove the malware.
The amount the FBI paid to have the iPhone hacked was supposed to remain classified.
macOS has never been immune to malware, bugs or viruses there just weren’t enough people using the OS for hackers to bother. Apparently, that has changed.
We have reached out to Google for an official statement on the matter and will update this post when we can.
Motherboard also says these orders could last indefinitely and be used against people who are not involved in a crime.
Both apps claim to supply two distinct functions, Phone Boost and CPU Cooler, which Chen says are fake.
Dok Malware is hidden inside a zip file sent via email, deleting unknown emails should keep you safe.
What Goodin has uncovered here is important for Greyhound.com users to know, thus we’re helping to spread the word.
This package scam involves distracting the target with a fraudulent credit card charge then sending a return label for the goods.
The most basic thing to consider before buying any type of software is to find out if it’s compatible with your operating system.
Regular consumers are easier targets and have fewer resources than major companies in combating criminals and ransomware demands.
Zak soon did some digging and found that the app sent “all available information” from his phone to third parties such as Segment.io, a company who sells user data.
Some experts believe the Shadow Brokers is a cover name for the Russian government but no proof of that is out just yet.
The company is pretty straight up on this one, recommending you simply refrain from sending or opening any Word documents period.
The team responsible for Cyber Security Europe have decided to bring the same sort of event to the McCormick Place convention center.