Featured Blogs
JavaScript-PHP Joint Exercise Delivers Nemucod Ransomware
The ransomware Nemucod has been very prevalent in the last few months. Nemucod’s habit of frequently changing its delivery mechanism...
Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423
In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft’s Jet Database Engine....
Jumping Into the Flames of Skywiper
There has been quite a bit of analysis and speculation about the Flamer/Skywiper threat. As we started to analyze this...
June #SecChat Recap: Findings from the 2016 Verizon DBIR
This year’s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and 2,260...
Just One of Many Internet Scams
A good friend of mine called me recently to ask what I knew about scams from online sales. He had...
Keep It Real: How McAfee Is Using AI to Fight AI—and End Scam Stigma
Was that spinning head a mistake—or the whole point? When McAfee dropped a new digital ad showing a woman lounging...
Keep Remote Classes Safe and in Session: What You Need to Know About Netop Vision Pro
Keep Remote Classes Safe and in Session: What You Need to Know About Netop Vision Pro Distance and hybrid learning...
Keep the Change: 3 Tips for Using the Twitter Tip Jar
When we think of tipping, many don’t see it as anything beyond a display of gratitude. However, Twitter’s latest feature is prompting its users to rethink this sentiment. It hasn’t been long since Twitter...
Keep Your Computer Close: PoisonTap Can Unlock It Almost Instantly
It’s never a good idea to leave your computer unattended. Since it carries mounds of valuable data, an unchaperoned computer...
