X

Category: Security

Worried about email security? Here’s what you can do

Your inbox overflowing with spam is an annoyance, but a carelessly opened malware-laden message can…

Is printer security a gap in your data protection strategy?

Your office printers are multifunctional devices that print, scan, fax, copy, scan to cloud, and…

Ditching the O365 password for better MFA security

Multi-factor authentication can reduce the effectiveness of stolen credentials, but as long as the password…

Outsiders using your company’s business WiFi network? Here’s what to do

Your business WiFi network is on the radar of evil geniuses — and cheap neighbors.…

Implement endpoint security without killing your budget

Endpoint security is no longer an option — it’s a necessity, considering the mounting digital…

GoScanSSH malware targeting public SSH servers

An aggressive reconnaissance malware dubbed GoScanSSH malware that targets public-facing SSH servers may be the…

Carbanak malware gang leader captured in Spain

A major law enforcement operation, with help from the InfoSec world, has resulted in the…

Face facts: Biometric authentication may have finally come of age

Do you wonder about the accuracy and reliability of Windows 10’s facial recognition biometric authentication…

A compliance program is not the same as an information security program

Because of the steady stream of cyberattacks, companies have beefed up their security programs. But…

Netflix bug bounty program expanded, payouts increased

A new public Netflix bug bounty program opens vulnerability searching to all white hats and…