Brute force attacks: Digital blitzkriegs
Brute force attacks are relatively simple and can be devastating if successful. Learn about how they work and the best defenses against them.
Zero-day exploits: Ticking time bomb cybersecurity attacks
All about zero-day exploits.
What is Trojan malware?
What Trojans are, how they work, and how to protect against them.
Malware: An original cyberthreat
The history of malware dates back to the mid 1960s, but it’s still one of the most common cyberthreats.
Social engineering: Hacking human psychology
Unlike other types of cyberattacks, the main component of social engineering is human psychology.
Ransomware: Digital extortion
Ransomeware is a specific type of cyberattack that relies on digital extortion.
Phishing: One of the most common cyberattacks
Learn about how phishing works, its various types, and how to protect yourself from it in the age of AI.
Cyberattack types: The threat landscape keeps expanding
Explore some of the most common cyberattacks and the best defenses for them.
Application whitelisting: A powerful cybersecurity tool
Application whitelisting is a powerful cybersecurity tool that addresses a layer other solutions don’t.
IDS vs. IPS: Why your organization needs continuous monitoring
Discover the differences between IDS and IPS continuous monitoring.
Antivirus software: What it is and how it works
Antivirus software is a method of localized endpoint defense. Learn what it is and how it works.
EDR: What it is and why your organization needs it
Understand what endpoint detection response is and why it’s an important cybersecurity tool.
The importance of a defense in depth cybersecurity strategy
Learn about the elements of a defense in depth security posture.
New hacker group attacks satellite, defense, and telecom companies
A new hacker team labelled Thrip by cyber security company Symantec has successfully infiltrated satellite, defense, and telecom companies using a “living off the land” attack. A living off the land attack uses common computer utilities that attackers use to conduct “undetectable” activities on the network. Because the attacker is using common utilities, companies may […]
D-Link routers under attack by Internet of Things botnet
A recently discovered vulnerability created a way for hackers to add malicious code to a popular model of router manufactured by D-Link. The malware that hackers are using is adding internet connected devices to a botnet with the intent to mine cryptocurrency and orchestrate denial of service attacks. The botnet in question is known as […]
Password management for the modern computer user
Passwords are quickly becoming a cornerstone to modern living. From computers and mobile devices to webpage logins, your passwords are one of the most important pieces of data you have, surpassed only by social security and bank routing numbers. The problem is that people don’t treat them that way. Users choose weak and overused passwords […]
5 ways to secure your home’s Wi-Fi
1. Use the correct Wi-Fi security standard WPA2 is the leading security standard for Wi-Fi networks. Past Wi-Fi security standards have vulnerabilities that have not been patched yet and are considered obsolete. For example, WEP encryption can be cracked in a matter of seconds using specialized software that anyone can obtain. WPS is another standard […]
Altr begins work on blockchain technology for cybersecurity
The security company Altr is looking to improve the world of corporate data security using blockchain technology. Altr has been in business since 2014 and has recently received funding of $15 million from private investors, large financial institutions, and IT firms around the United States. The company can now begin working on their new technology […]
Signature Checks exploit on Mac OS fixed
Mac OS has been vulnerable to malware through a flaw in the security signatures process for third-party developers. Digital signatures are a way for users to know if a piece of software is certified safe with the operating system’s parent company, in this case Apple. Third-party developers must go through a process to ensure that […]
RSA Cryptographic Library Permanently Broken
An RSA key developed by Infineon and used by governments, corporations, and TPM modules has recently been found to be broken. The weakness, which only affects keys that were generated using smartcards and other embedded devices using the Infineon Library, uses the public portion of the key to calculate private portion in relatively short order; […]