How to write YARA rules for improving your security and malware detection

How to write YARA rules for improving your security and malware detection

YARA won’t replace antivirus software, but it can help you detect problems more efficiently and allows more customization. Learn how to write YARA rules to improve security and incident response . Image: iStock/vadimrysev In our first article about YARA, we defined what kind of tool it was and in which context it could be used: detecting malware on the network or on endpoints, helping incident response and monitoring, classifying files or even detecting sensitive data…

Read More

University of Maryland and DoD open security research lab

University of Maryland and DoD open security research lab

University of Maryland and DoD open security research lab | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

How to lock a Zoom meeting to keep out unwanted guests

How to lock a Zoom meeting to keep out unwanted guests

One good way to prevent unwelcome participants or late arrivals from joining your Zoom meetings is to lock those meetings. Here’s a look at how it’s done. Image: iStock/AndreyPopov You want to be able to prevent unwanted visitors from barging in on one of your Zoom meetings. One option is to lock the meeting. When you lock a meeting, the visitor receives a notification telling them that it’s locked. If necessary, you can easily unlock…

Read More

Boston Scientific’s Global Security and Resiliency Department takes the lead in COVID-19 response

Boston Scientific’s Global Security and Resiliency Department takes the lead in COVID-19 response

Boston Scientific’s Global Security and Resiliency Department takes the lead in COVID-19 response | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Lenovo’s top 7 technology predictions for 2022

Lenovo’s top 7 technology predictions for 2022

From 5G transforming personal computing to better healthcare, technology in 2022 will do a lot of heavy lifting. Image: Shutterstock/peterschreiber.media Well, it’s that time of year again. Predictions season. As soon as the Thanksgiving turkey gets cold and the Christmas lights go up, people start counting down the days on the current calendar and begin looking ahead to the new year.  Luca Rossi, president of the Intelligent Devices Group at Lenovo, is no different. He…

Read More

Cuba Ransomware Nets Nearly $50m

Cuba Ransomware Nets Nearly m

The threat actors behind the Cuba ransomware variant have already amassed $44m through targeting of at least 49 victims, according to the FBI. The bureau’s latest ‘flash’ alert revealed that the group had demanded at least $74m from its victims. These victims frequently come from critical infrastructure sectors like financial, government, healthcare, manufacturing, and IT. “Cuba ransomware is distributed through Hancitor malware, a loader known for dropping or executing stealers, such as Remote Access Trojans (RATs) and…

Read More

State Department Phones Hijacked by Spyware

State Department Phones Hijacked by Spyware

Nine US State Department officials had their iPhones remotely hacked by spyware from controversial firm NSO Group, according to reports. Four people familiar with the matter told Reuters that the Israel developer’s Pegasus malware was used to snoop on the US government victims over the past few months. Although the identity of the hacker(s) is unknown, the targeted staffers were either based in Uganda or working on projects concerning the African country. They were apparently…

Read More

Romance Fraudster Targeted 670 Women Online

Romance Fraudster Targeted 670 Women Online

A romance fraudster who targeted hundreds of women online has pleaded guilty to charges of fraud and money laundering. Osagie Aigbonohan, 40, from Lagos, Nigeria, is currently awaiting sentencing after appearing before Southwark Crown Court on Friday. His scams are said to have tricked at least nine victims he befriended on dating sites into sending him money, including one woman who was conned out of nearly £10,000. That victim made nine payments over the course…

Read More

Dell Technologies takes a holistic, risk-based approach to build resilience

Dell Technologies takes a holistic, risk-based approach to build resilience

Dell Technologies takes a holistic, risk-based approach to build resilience | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

5 minutes with Teresa Shea: Avoiding cyberattacks

5 minutes with Teresa Shea: Avoiding cyberattacks

5 minutes with Teresa Shea: Avoiding cyber attacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2,121 2,122 2,123 2,124 2,125 2,764