This Year at Black Hat: Danger Drones and Thermostat Ransomware
This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it...
Patch Now: Simple Office ‘Protected View’ Bypass Could Have Big Impact
Protected View is a security feature of Microsoft Office. According to research from MWR Labs, Protected View mode is a strong...
Business Email Compromise Hurts Your Organization
As many workers do today, you probably get emails from your boss asking you to perform various tasks. You may...
June #SecChat Recap: Findings from the 2016 Verizon DBIR
This year’s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and 2,260...
What We Can Take Away from the Milwaukee Bucks Data Breach
Large sports leagues are no strangers to the spotlight, and basketball is no different. The latest scandal? Last week, a...
Email Hackers, Go Home! New Security Updates Come to Gmail
Email has been an integral part of our culture for more than two decades now. It seems like just yesterday...
A Case of Mistaken Identity? The Role of BlackEnergy in Ukrainian Power Grid Disruption
Recent reports of electricity outages across the Ukraine has led to significant speculation regarding the specific malware that was used...
Best practices for preventing Dridex infections
Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of...
Google Brings Safe Browsing to the Masses With Its Safe Browsing API
The best way to protect yourself from the malicious programs (often called malware) hidden across the Internet, is to have...
What is a Remote Administration Tool (RAT)?
Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I...