Malwarebytes acquihires duo behind AdwCleaner
Malwarebytes announced today that they have acquired AdwCleaner, the popular utility used to clean up adware, toolbars, and other potentially unwanted programs. Version 6 of the program was released...
View ArticleCisco investing $10 million in cybersecurity with scholarship program
Cisco is investing $10 million in the industry with its Cybersecurity Scholarship program. They are introducing two new CCNA Cyber Ops security certificates and for those awarded the scholarship, they...
View ArticleSymantec Endpoint Protection 14 released, takes advantage of Bluecoat...
Symantec announced that the latest version of their enterprise antivirus is now available. Symantec Endpoint Protection 14 brings two new features to the product line that is sure to give them an...
View ArticleShodan – the search engine for Internet-connected devices
Shodan, taking its name from the AI in the System Shock video game series, is a search engine for devices reachable on the Internet. The index is built by crawlers scanning the web 24/7 looking for...
View ArticleMalwarebytes 3.0 released
Malwarebytes has released version 3.0 of their antimalware product. The new features include scanning four times faster, anti-exploit and anti-ransomware signature-less technology, and a new user...
View ArticleDon’t forget printers in your IoT security
This is a sponsored post written by me on behalf of HP MPS. All opinions are 100% mine. Internet of Things security is garnering a lot of discussion after the Mirai botnet took down several popular...
View ArticleGmail will block .js attachments
Google has announced that Gmail including G Suite (formerly Google Apps) will begin blocking attachments with the file extension of .js. This means you will not be able to send .js (typically...
View ArticleAV-Test announces 2016 Endpoint Protection awards; Gartner updates antivirus...
AV-Test, an independent institute that evaluates antivirus products, has awarded their 2016 best product awards. Fifteen awards were presented across different categories such as Protection,...
View ArticleFirst release since the AVG acquisition, Avast 2017 available
Avast 2017 was released today for the free and paid markets. Avast Free Antivirus, Avast Pro Antivirus, Avast Internet Security and Avast Premier were all updated with new features to improve...
View ArticlePre-order study resources for CompTIA’s new CyberSecurity Analyst CSA+...
CompTIA launched a new certification for those in cybersecurity called CSA+. It builds upon the Security+ certificate with a track towards the CASP (CompTIA Advanced Security Practitioner) certificate....
View ArticlePwn2Own 2017 results
As the second year under Trend Micro’s ownership, the popular hacking event Pwn2Own is celebrating its 10 year anniversary. The targets this year include VMware Workstation, Microsoft Hyper-V, Google...
View Article‘The Wolf’ commercial by HP lays out the enterprise security risk from...
This is a sponsored post written by me on behalf of HP MPS. All opinions are 100% mine. HP made a very clever series of commercials called ‘The Wolf’. The wolf is the attacker of a corporate...
View ArticleConfigure a View in Outlook to help prevent falling for phishing
Phishing messages to your work email can be costly if the wrong person replies with confidential information. If you use Outlook for your email client, it can help identify those messages from outside...
View ArticleAllRecipes.com announces potential breach
AllRecipes.com is a website for sharing recipes and learning about food. Yesterday, the company emailed out that accounts created before June 2013 may have been intercepted during registration. This...
View ArticleThere is no welfare when you are below the information security poverty line
The term ‘security poverty line’ was coined back in 2011 by Wendy Nather. It describes organizations who are under-spending on IT security in terms of maintaining an effective level of security or even...
View ArticleDell begins releasing BIOS updates to address Intel AMT Security Advisory
Dell has started releasing BIOS updates to computers affected by the disclosed vulnerability in the Intel AMT framework. Intel’s Active Management Technology, Intel Standard Manageability, and Intel...
View ArticleCyberbullying and Teenagers – Protect Kids Using Mobile Phone Parental Control
Among all the problems that occur due to excessive involvement with social media, cyber-bullying is undoubtedly the most common one. Using mobile devices, “tweens” and teens stay connected to their...
View ArticlePSA: Severe Global Ransomware Attack Underway
Once the "Petya" ransomware has infected your system, it encrypts all of your files and displays, on screen, instructions on how you can pay the ransom and regain access to your files. The post PSA:...
View ArticleCloud Security vs. Productivity: Finding the Right Balance
The digital age increased human productivity but also opened up companies to greater security threats. Even a minor data security breach can destroy a company’s reputation, causing it to lose customers...
View ArticleMaintaining Security and Privacy in Today’s Online Environment
This is a topic with huge scope so we will break it up into several articles. In this article we will focus on your IP address – the single-most piece of information that ties your internet browsing to...
View Article