X

Security

Broken hearts: OkCupid vulnerability exposes users credentials to hackers

Looking for a match on OKCupid? If you open certain links, you could find a nightmare scenario instead of your…

Pentesting primer: You’re getting ‘hacked,’ so read the fine print

Pentesting has become a popular approach for validating a company's security. This makes it even more important you read your…

Google says it’s bolstered its defenses against Play Store malicious apps

The Google Play Store has been in the news way too often in connection with malicious apps that end up…

Cryptojacking applications discovered in Microsoft Store

If you downloaded certain apps from the Microsoft Store recently, you may be unwittingly a pawn in a cryptojacking scheme.

Rethinking how we authenticate: Continuous authentication for continuous security

Traditional ways of authentication no longer ensure effective security. For sufficient security at home and at work, continuous authentication is…

SysKey, so long, and thanks for all the fish!

For grizzled IT veterans who remember — or even still use —SysKey, it’s time to move on. The utility is…

Give it the finger: Pushing back against biometric authentication

Biometric authentication is becoming a fact of life in governments and in the commercial sector. But many say this is…

Don’t be a victim: 2019 cybersecurity trends SMBs must know about

Cybercriminals have you in their gunsights. But by knowing about these innovative cybersecurity trends, SMBs can avert attacks or minimize…

Best measures to protect yourself against data breaches

Your data is precious. You have spent time and money collecting it. But your treasure is a hacker’s prize. Here’s…

Razy malware is looking for cryptocurrency payday

Hacking for the sake of cryptocurrency payouts is all the rage, and Razy is just the latest malware to capitalize…