Featured Blogs
Security Lessons From 2019’s Biggest Data Breaches
2019 already feels like it’s worlds away, but the data breaches many consumers faced last year are likely to have...
Security on Silicon the Next Big Step in Cyber Protection
With the growth of the Internet of Things, going from 15 billion to 200 billion devices by 2020, and the...
Security Threat Concerns ATM Industry
Today, there are over 2.2 million ATMs worldwide, and by 2015 there will be around 3 million. ATM skimming accounts...
Security, By the Numbers, Is Big
When you quantify security, the numbers are big and plentiful. The reality of data being compromised is staggering, but we...
See Yourself in Cyber – Five Quick Ways You Can Quickly Get Safer Online
With “See Yourself in Cyber” as the theme for this year’s Cybersecurity Awareness Month, the focus is on you with...
Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes
This blog post was written by Kalpesh Mantri. Darkleech is an Apache module on the dark web that distributes malware....
Seeking Reconnection: Internet Usage and the Return to Travel
Even as the internet kept us connected with family and friends during the pandemic, people remain understandably eager to reconnect in person as vaccines roll...
Self-Signed Certificates Can Be Secure, So Why Ban Them?
This blog was co-written by Brook Schoenfield and Ramnath Venugopalan. In many organizations the use of self-signed certificates is forbidden...
Selfies with Boarding Passes: A Silent Cybersecurity Risk
Who doesn’t look forward to their next vacation or holiday? With a simple plane ticket, you can be off to...
Send Your Kids Back to School with Cybersecurity Knowledge
Summer vacation is on and chances are that your kids are spending time indoors as the scorching sun makes it...
Send Your Kids Back to School with Mobile Safety in Mind
The days are getting shorter and your bags are (finally) unpacked from the annual family vacation. Summer is officially coming...
Sensitive Data on 3 Million Facebook Users Potentially Exposed by Suspended App
From Facebook to Twitter and now back to Facebook – the past few months have seen some of the most...
Server-Side Request Forgery Takes Advantage of Vulnerable App Servers
This blog was written by Kunal Garg. Server-side request forgery is an attack in which an attacker can force a...
Service Provider [24]7.ai Breached, Leaked Customer Data from Delta Airlines, Sears, Kmart
A huge part of modern-day customer service is the chat functionality, which allows customers to converse easily with representatives of...
Setting the Bar for Marketing Innovation – Evolving our Marketing Strategy in the Security Technology Industry
Every year we recognize partners for achieving excellence in a variety of categories. Last month at our Americas Partner Summit,...
Setting the Stage for Your Video Interview: Job Hunting From Home
If you’ve lined up your first video interview, or just new to the whole idea in general, how do you...
Setting Up HTTPS for Google App Engine Applications
Thursday, we posted advice on creating a custom domain name for an application developed with Google’s App Engine. In this...
Setting Up Parental Controls in TikTok, Instagram & Snapchat
It’s a question we get a lot from parents: “How can I keep my kids safe when they are constantly...
Seven Android Apps Infected With Adware, Downloaded Over 500,000 Times
The amount we use our apps and the amount of apps we use has shown no signs of slowing. And...
Seven Windows Wonders – Critical Vulnerabilities in DNS Dynamic Updates
Overview For the March 2021 Patch Tuesday, Microsoft released a set of seven DNS vulnerabilities. Five of the vulnerabilities are...
Sex Sells: Looking at Android Adult Adware Apps
Advertising is one of the primary methods to generate money from mobile devices. Ads can be displayed in the browser...
Sextortion – What Every Parent Needs To Know
Imagine this. You’re 15, feeling unsure about yourself in the world, possibly even a little lonely. One day, a pretty...
Sextortion: What Your Kids Need to Know
Sextortion is a nightmare scenario no parent wants to contemplate, yet recent FBI reports indicate a distressing rise in cases...
Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems
Last week the McAfee Advanced Threat Research team posted an analysis of a new wave of Shamoon “wiper” malware attacks...
Shamoon Rebooted in Middle East, Part 2
Last week we provided some initial analysis on recent attacks targeting organizations in the Middle East. The attack has hallmarks...
Shamoon Rebooted?
We have recently received notifications and samples from impacted organizations in the Middle East that have hallmarks of the Shamoon...
Shamoon Returns to Wipe Systems in Middle East, Europe
Destructive malware has been employed by adversaries for years. Usually such attacks are carefully targeted and can be motivated by...