You’re In Safe Hands with Trend Micro Home Network Security

A three-part series on using Home Network Security to protect your home Your home should be a haven that protects you. In the cyber age, however, your router, computers, and TVs, your game consoles and smart devices, are continuously connected to the internet and run the risk of being hacked—usually when you least expect it…
The post You’re In Safe Hands with Trend Micro Home Network Security appeared first on . Read More HERE…

Read more

Stalking the Stalkerware

Ever get the feeling you’re being followed? Unfortunately, when it comes to our digital lives, this is increasingly the case. But while we’re all keen to boost our followers on social media, it’s a different matter when it comes to anonymous third parties secretly stalking us online. Yes, we’re already tracked by ISPs every time…
The post Stalking the Stalkerware appeared first on . Read More HERE…

Read more

Warning! Windows 10 Fake Update is Actually Ransomware

Microsoft never sends updates via email. Many folks don’t know that, which is why a new ransomware campaign masquerading as a Windows 10 update is so pernicious. You may have already gotten a fake notice saying “Install Latest Microsoft Update Now!” Or “Critical Microsoft Windows Update!”, with the body of the message asking you to…
The post Warning! Windows 10 Fake Update is Actually Ransomware appeared first on . Read More HERE…

Read more

Online Phishing: How to Stay Out of the Hackers’ Nets

Despite the growing popularity of social media and messaging apps, email remains the preferred way to communicate online for millions of Americans. And the bad guys know it. Of the 28.6 billion cyber-threats Trend Micro blocked globally in the first half of 2019, over 24.3 billion were carried by email. That’s 91%. Many of these…
The post Online Phishing: How to Stay Out of the Hackers’ Nets appeared first on . Read More HERE…

Read more

Decrypting What Zero Trust Is, And What It Likely Isn’t

It’s always an indicator of confusion when instead of hearing “I want Q” I’m asked “what is Q?”. In this case the ‘Q’ is Zero Trust.  I’ll try and give my best take on what I understand Zero Trust to be. History Repeats Let’s start with the background. Quite a while back the Jericho Forum…
The post Decrypting What Zero Trust Is, And What It Likely Isn’t appeared first on . Read More HERE…

Read more

This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how a total of 118 new ransomware families emerged in the first half of 2018, but only 47 new ones debuted in the first six…
The post This Week in Security News: Ransomware Campaigns Persist with WannaCry as Most Common appeared first on . Read More HERE…

Read more

How Do Threats Align With Detection And Solutions?

There are many different threats targeting many different areas of a corporate network. Have you ever wondered how those threats are stopped? What threats impact which areas of a network? What technology detects and blocks those threats? I wanted to build an interactive graphic to answer those questions. This interactive infographic can help you understand…
The post How Do Threats Align With Detection And Solutions? appeared first on . Read More HERE…

Read more

This Week in Security News: Unpatched Systems and Lateral Phishing

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about an attack against Elasticsearch that delivers backdoors as its payload. Additionally, read how cybercriminals are turning to hijacked accounts to perform lateral phishing attacks on…
The post This Week in Security News: Unpatched Systems and Lateral Phishing appeared first on . Read More HERE…

Read more

Why it’s Time to Switch from Facebook Login to a Password Manager

Social media sites are increasingly the focus of our digital lives. Not only do we share, interact and post on platforms like Facebook —we also use these sites to quickly log into our favorite apps and websites. But what happens when these social media gatekeepers are hacked? Awhile back, Facebook suffered a major attack when…
The post Why it’s Time to Switch from Facebook Login to a Password Manager appeared first on . Read More HERE…

Read more