Viewpoints

Sky-high concerns: Understanding the security threat posed by drones

They are susceptible to all the cyber threats that face the Internet of Things, and can be hijacked for unintended purposes

26 September 2019 min read
Business Security

Your best customer retention strategy – proactive security

perex__ SMBs continue to be the largest percentage of businesses targeted by cybercrime – here's what you can do

SMBs continue to be the largest percentage of businesses targeted by cybercrime – here's what you can do

25 September 2019 min read
Viewpoints

AI never forgets, so we must teach it to forgive

perex__ Artificial intelligence is listening, and that is unstoppable – but we must all safeguard the privacy of children

Artificial intelligence is listening, and that is unstoppable – but we must all safeguard the privacy of children

22 September 2019 min read
Security News

24 million medical records exposed

perex__ Plus, a FIN7 hacker pleads guilty to cybercrime, the Brazilian IT sector is up in arms over government plans, and ethical hackers will get a crack at an orbiting satellite

Plus, a FIN7 hacker pleads guilty to cybercrime, the Brazilian IT sector is up in arms over government plans, and ethical hackers will get a crack at an orbiting satellite

20 September 2019 min read
Business Security

A guide for detecting a phishing email for businesses

perex__ {value=Find out why hackers are using phishing email scams and how to detect them and warn your employees}

Find out why hackers are using phishing email scams and how to detect them and warn your employees

16 September 2019 min read
Security News

U.S. sanctions North Korean hackers behind WannaCry

perex__ {value=Can threats to freeze assets be effective against groups backed by a foreign government? }

Can threats to freeze assets be effective against groups backed by a foreign government?

14 September 2019 min read

Browse
Boldly

Keeping the
world safe from
cyberattacks

Learn more
Security News

DDoS attack forces Wikipedia offline

perex__ Plus, a BEC bust leads to 281 arrests, a new phishing scam cleverly uses captcha, and will the next trend of IoT hacking involve your local gas pump?

Plus, a BEC bust leads to 281 arrests, a new phishing scam cleverly uses captcha, and will the next trend of IoT hacking involve your local gas pump?

13 September 2019 min read
Viewpoints

A primer on the promise and pitfalls of the Internet of Things

perex__ Granular behavior profiling paves the way for new digital lifestyles – and creates big privacy and security questions

Granular behavior profiling paves the way for new digital lifestyles – and creates big privacy and security questions

12 September 2019 min read
Viewpoints

Hackers set the pace in security

perex__ Criminals get a head start, but we can chase them down with laws, industry tools, and consumer protection

Criminals get a head start, but we can chase them down with laws, industry tools, and consumer protection

11 September 2019 min read
Threat Research

Flashlight apps on Google Play request up to 77 permissions each, Avast finds

perex__ Researchers analyze 937 flashlight apps and find permission requests that could expose users

Researchers analyze 937 flashlight apps and find permission requests that could expose users

10 September 2019 min read
Security News

419M Facebook user records leaked in data breach

perex__ Plus, ransomware hits yet another NY school district, a phishing scheme uses hacked SharePoint accounts, and a unique RAT targets Brazilian Android users.

Plus, ransomware hits yet another NY school district, a phishing scheme uses hacked SharePoint accounts, and a unique RAT targets Brazilian Android users.

6 September 2019 min read
Security News

Critical flaw found in many Android smartphones

perex__ Android phones made by Samsung, Huawei, LG, and Sony have been found to have a major vulnerability.

Android phones made by Samsung, Huawei, LG, and Sony have been found to have a major vulnerability.

5 September 2019 min read