Cyber News Rundown: Dark Tequila Malware
Reading Time: ~2 min.Dark Tequila Targets Mexican Financial Organizations Over the past 5 years, one malware campaign has been plaguing the financial industries of Mexico: Dark Tequila. While many...
View ArticleCyber News Rundown: Texas Voter Data Leaked
Reading Time: ~2 min.Texas Voters’ Data Leaked A security researcher just discovered a publicly-available file containing sensitive voting informationfor nearly 99% of all registered voters in the...
View ArticleEICAR – The Most Common False Positive in the World
Reading Time: ~4 min.If you saw a file called eicar.com on your computer, you might think it was malware. But, you would be wrong. Readers, if you haven’t yet met the EICAR test file, allow me to...
View ArticleCyber News Rundown: Banking Trojans in Google Play
Reading Time: ~2 min.Banking Trojans Still Appearing in Google Play Store Multiple security researchers recently discovered a handful of banking trojans that have still managed to make their way into...
View ArticleCyber News Rundown: Big Data Mismanagement
Reading Time: ~2 min.Massive Customer Database Left Exposed by Data Management Firm A security researcher recently found a database containing customer information for nearly half a billion users of...
View ArticleCyber News Rundown: Newegg Breached
Reading Time: ~2 min.Newegg Breach Lasts Nearly a Month Newegg finally addressed a recent breach after unknowingly hosting malicious code within a payment page for the last month. While the company is...
View ArticleUnsecure RDP Connections are a Widespread Security Failure
Reading Time: ~3 min.While ransomware, last year’s dominant threat, has taken a backseat to cryptomining attacks in 2018, it has by no means disappeared. Instead, ransomware has become a more targeted...
View ArticleCyber News Rundown: Firefox Vulnerable to DoS Attack
Reading Time: ~2 min.Firefox Vulnerability Leads to Crash A new denial-of-service (DoS) attack has been created with the ability to cause desktop versions of the browser Firefox to freeze or crash....
View ArticleCyber News Rundown: Botnet Targets Brazil’s Banks
Reading Time: ~2 min.Brazilian Bank Traffic Rerouted by Massive Botnet A botnet containing more than 100,000 routers and other devices was recently spotted hijacking traffic destined for several...
View ArticleCyber News Rundown: Windows 10 Update Deletes Files
Reading Time: ~2 min.Latest Windows 10 Update Removes User Files Microsoft recently pulled its latest update, version 1809, after several users complained about personal files being deleted. While some...
View ArticleWebroot WiFi Security: Expanding Our Commitment to Security & Privacy
Reading Time: ~3 min.For the past 20 years, Webroot’s technology has been driven by our dedication to protecting users from malware, viruses, and other online threats. The release of Webroot® WiFi...
View ArticleResponding to Risk in an Evolving Threat Landscape
Reading Time: ~3 min.There’s a reason major industry players have been discussing cybersecurity more and more: the stakes are at an all-time high for virtually every business today. Cybersecurity is...
View ArticleCyber News Rundown: Voter Records for Sale
Reading Time: ~2 min.2018 Voter Records for Sale As the United States midterm elections draw closer, concern surrounding voter information is on the rise, and for good reason. Records for nearly 35...
View Article5 Tips for Optimizing Your VPN Experience
Reading Time: ~3 min.By now, you likely know that a Virtual Private Network (VPN) is essential to remaining safe when working remotely. But, once set up, how can you optimize your VPN to work well with...
View ArticleCyber News Rundown: Medicare Data Breach
Reading Time: ~2 min.Data Breach Affects Centers for Medicare & Medicaid Services The Centers for Medicare & Medicaid Services (CMS) announced last week they had discovered malicious activity...
View ArticleCyber News Rundown: DemonBot Rising
Reading Time: ~2 min.DemonBot Botnet Gaining Traction DemonBot, while not the most sophisticated botnet discovered to date, has seen a significant rise in usage over the last week. With the ability to...
View ArticlePassword Constraints and Their Unintended Security Consequences
Reading Time: ~5 min.You’re probably familiar with some of the most common requirements for creating passwords. A mix of upper and lowercase letters is a simple example. These are known as password...
View ArticleReducing Risk with Ongoing Cybersecurity Awareness Training
Reading Time: ~3 min.Threat researchers and other cybersecurity industry analysts spend much of their time trying to anticipate the next major malware strain or exploit with the potential to cause...
View ArticleCyber News Rundown: HSBC Data Breach
Reading Time: ~2 min.Data Breach Nabs HSBC Account Info HSBC has been monitoring some unauthorized access occurring over a ten-day period on their customer’s online accounts. During this time,...
View ArticleCyber Monday: Big Savings, Big Risks
Reading Time: ~3 min.What business owners and MSPs should know about the year’s biggest online retail holiday It’s no secret that Black Friday and Cyber Monday are marked by an uptick in online...
View Article