Our news
-
Pandemic, A Driving Force in 2021 Financial Crime
Ransomware gangs with zero-days and more players overall will characterize financially motivated cyberattacks next year.
-
Home Internet Protection for Kids
How to Make Your Home Network Better Your Kids internet activity is suspicious and at risk. The problem in most cases is that the parents and kids usually aren’t aware. Let’s tackle the common questions we receive from Parents: Why is my internet so slow? How do I monitor my kids TikTok, Snapchat, Instagram, Twitch,…
-
Cybersecurity Predictions for 2021: Robot Overlords No, Connected Car Hacks Yes
While 2021 will present evolving threats and new challenges, it will also offer new tools and technologies that will we hope shift the balance towards the defense.
-
Fortinet FortiOS System File Leak
Original release date: November 27, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) is aware of the possible exposure of passwords on Fortinet devices that are vulnerable to CVE 2018-13379. Exploitation of this vulnerability may allow an unauthenticated attacker to access FortiOS system files. Potentially affected devices may be located in the United States. Fortinet…
-
Changing Employee Security Behavior Takes More Than Simple Awareness
Designing a behavioral change program requires an audit of existing security practices and where the sticking points are.
-
How to Update Your Remote Access Policy
Reducing the risks of remote work starts with updating the access policies of yesterday.
-
Critical MobileIron RCE Flaw Under Active Attack
Attackers are targeting the critical remote code-execution flaw to compromise systems in the healthcare, local government, logistics and legal sectors, among others.
-
Light-Based Attacks Expand in the Digital Home
The team that hacked Amazon Echo and other smart speakers using a laser pointer continue to investigate why MEMS microphones respond to sound.
-
Baidu Apps in Google Play Leak Sensitive Data
Cyberattackers could use the information to track users across devices, disable phone service, or intercept messages and phone calls.