Digital Spring Cleaning: Seven Steps for Faster, Safer Devices | McAfee Blogs

Digital Spring Cleaning: Seven Steps for Faster, Safer Devices | McAfee Blogs

Throw open the windows and let in some fresh air. It’s time for spring cleaning. And that goes for your digital stuff too. Whether it’s indeed spring where you are or not, you can give your devices, apps, and online accounts a good decluttering. Now’s the time. Cleaning them up can protect your privacy and your identity, because when there’s less lying about, there’s less for hackers to scoop up and exploit. The reality is…

Read More

Gaining a video surveillance ‘edge’ in the cloud

Gaining a video surveillance ‘edge’ in the cloud

Gaining a video surveillance ‘edge’ in the cloud | 2021-04-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Product spotlight on cybersecurity, data protection, and privacy solutions

Product spotlight on cybersecurity, data protection, and privacy solutions

Product spotlight on cybersecurity, data protection, and privacy solutions | 2021-04-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

A quick round up of privacy highlights for Q1 of 2021

A quick round up of privacy highlights for Q1 of 2021

As expected, the start of 2021 has seen unprecedented movement in the U.S. with 22 states introducing comprehensive privacy legislation and even more introducing specific-use legislation. To date, hundreds of privacy bills were introduced across the states; to give some perspective, more than 50 privacy bills were introduced in New York alone. Undoubtedly a hot topic, it seemed anyone with an idea for a privacy bill put it in writing and introduced it to their…

Read More

US Imprisons “Sadistic” Sextortionist

US Imprisons “Sadistic” Sextortionist

US Imprisons “Sadistic” Sextortionist A man from California has been sent to prison for cyberstalking two people and threatening to murder them unless they performed sex acts on him. US Judge Dolly Gee described the actions of Covina resident Carl De Vera Bennington as "sadistic" and "cruel” before handing him a custodial sentence. One of the victims of 34-year-old Bennington was just a teenager when he began targeting her. The cyberstalking took place over a period of…

Read More

NAME:WRECK: Nine DNS Vulnerabilities Found in Four Open Source TCP/IP Stacks

NAME:WRECK: Nine DNS Vulnerabilities Found in Four Open Source TCP/IP Stacks

Nine new DNS-related vulnerabilities have been identified across TCP/IP stacks embedded in millions of devices. Background On April 13, 2021, researchers at Forescout and JSOF published a report called NAME:WRECK. The report details the discovery of nine Domain Name System (DNS) vulnerabilities across four widely used open-source TCP/IP stacks. Conservative estimates suggest that the flaws are present in over 100 million devices. NAME:WRECK is the third TCP/IP report to stem from research conducted through PROJECT:MEMORIA;…

Read More

How to set up an SSH tarpit in Ubuntu Server 20.04

How to set up an SSH tarpit in Ubuntu Server 20.04

Jack Wallen shows you how to add an SSH tarpit to Ubuntu Server with the help of endlessh. Image: iStock/http://www.fotogestoeber.de In your never-ending quest to secure your Linux servers, you’ve probably found a lot of times the breaches happen through SSH. No matter how secure it is, it can still be cracked. That’s why you might need to consider setting up a tarpit for that service. Essentially, a tarpit will run on the standard SSH…

Read More

Phishing attack ramps up against COVID-19 vaccine supply chain

Phishing attack ramps up against COVID-19 vaccine supply chain

Targeting global companies, the attackers are likely seeking confidential data on the distribution and storage of the coronavirus vaccines, says IBM Security X-Force. Image: iStock/gopixa Cybercriminals have been expanding a phishing campaign designed to steal critical information from companies involved with COVID-19 vaccines, security group IBM Security X-Force said on Thursday. In a new report, X-Force said it recently discovered a series of phishing emails targeting 44 companies across 14 countries, all involved in the…

Read More

Sanctions Escalate US–Russia Tensions

Sanctions Escalate US–Russia Tensions

Relations between the United States and Russia have soured following the imposition of new sanctions by the Biden administration on America’s former Cold War enemy. The measures were introduced today in retaliation for cyber-attacks and election interference that the United States says were carried out by Russia. President Joe Biden announced the sanctions earlier today in one of the more than 50 executive orders he has signed during his first four months in power.  In the order, Biden…

Read More

Why Coin Miners Go Bad & How to Protect Your Tech When They Do | McAfee Blogs

Why Coin Miners Go Bad & How to Protect Your Tech When They Do | McAfee Blogs

Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and Monero to cash in on the recent gold rush. Bitcoin’s meteoric rise in value is making coin mining an appealing hobby or even a whole new career. Coin mining software is the main tool in a prospector’s belt.   Some coin miners, also known as cryptocurrency miners, are tempted by the dark side of the industry and resort to nefarious means to harness the immense computing power needed for cryptocurrency profits. Greedy cryptocurrency criminals employ a practice called cryptojacking, stealing the computer power of unsuspecting devices to help them mine…

Read More
1 2,310 2,311 2,312 2,313 2,314 2,565