cybersecurity

Beware Ad Attacks: Malvertising is Booming

Remember when online security meant avoiding those sites on the wrong side of the tracks? No more. Malvertising is booming—not only in the number of…

FREAK Attack Warning: Apple and Google Devices Most Vulnerable

An SSL/TLS vulnerability has been identified that attackers could use to downgrade the cryptography of HTTPS connections to one vulnerable to decryption. allowing attackers to…

NSA Report: Defensive Best Practices for Destructive Malware

The National Security Agency (NSA)’s Information Assurance Directorate has released a report on “Defensive Best Practices for Destructive Malware”. The document describes specific actions that…

Natural Grocers Reports Cardholder Data Breach

Natural Grocers, a Colorado based health food chain that operates in 13 state. is investigating a breach impacting customer payment card data. The company believes…

identity theft attack

Comodo KoruMail: Comprehensive Solution to the Spam Onslaught

Spam email is to the Internet what pollution is to waterways and phishing email is the most toxic of digital pollutants. Current measures for dealing…

Want $3 Million? Find Botnet Admin Evgeniy Bogachev

It is a sign of the times that a cyber criminal makes the FBI’s top 10 most wanted list. And the Feds are serious about…

Tax Season is Identity Theft Season

The only thing cybercriminals like more than activities that expose social security numbers are ones that involve debit/credit card transactions. With millions of people filing…

Thanksgiving Day

cWatch Delivers Umatched Awareness of Zero-day Threats & Malware

What’s worse, having your network compromised by a hacker or having your network compromised by a hacker and not knowing about it? Advanced Persistent Threats…

Anthem Data Breach: 80 Million Compromised

The latest high profile data breach is a big one. Health insurance provider Anthem is reporting that records of as many 80 million customers and…

Linux kernel

Who’s Afraid of the Linux Ghost? You Should Be!

The Linux GNU C Library (glibc) versions prior to 2.18 are vulnerable to remote code execution via a vulnerability in the gethostbyname function. The vulnerability,…

Ransomware Solutions - Get Free
X