How do MAC’s get infected anyway?

Author: by Phil Stokes | Sentinel One Three pervasive myths about Macs that you can find in almost any online discussion about security and macOS are “Macs are safe by design”, “Macs are not numerous enough to be of interest to malware authors” and (consequently) “there’s no real malware threats out there for...

COVID-19 Outbreak | Employees Working from Home? It’s Time to Prepare.

Don’t Let Security Be A Casualty of Supporting Remote Workers Author: by Yotam Gutman | Sentinel One The Covid-19 (novel Coronavirus) outbreak is having a major impact on businesses this quarter and, by all accounts, is set to be a major challenge for enterprises throughout the rest of the financial year....

PREPARING FOR 2020: TRENDS IN CYBERCRIME, THREATS, AND RISKS

As 2019 draws to a close, we take a look at how the year has panned out on the cyber front. What have been the main trends witnessed over the last 12 months, and what can we learn from them to prepare for 2020 and beyond? Ransomware: The ‘Gift’ to...

BILL TO ENHANCE REGULATORS’ CYBERSECURITY PASSES HFSC

The House Financial Services Committee passed the Cybersecurity and Financial System Resilience Act (H.R. 4458) by voice vote Wednesday. CUNA supports the bill and expressed its support in a letter to committee leadership earlier this week.H.R. 4458 would require NCUA and other sectors’ regulators to each issue an annual report to Congress...

Tewksbury law firm endures cybersecurity ‘nightmare’

Ellen A. Wright knew she had a problem on her hands when her paralegal told her the Tewksbury firm’s Google email account couldn’t be accessed. I was getting calls from my unstaffed office at midnight, which was absolutely terrifying.” — Ellen A. Wright, Wright Family Law Group But the family...

5 REASONS WHY CLOUD CAN TRANSFORM YOUR BUSINESS

Businesses are often puzzled by the thought of moving to the cloud. They are concerned with data loss, privacy risks, susceptibility to external attack, internet connectivity etc. But do these concerns outweigh the advantages of cloud computing? or are you afraid of the change? Comparing the Leading Cloud Providers Before...

Millions of PCs Found Running Outdated Versions of Popular Software

It is 2019, and millions of computers still either have at least one outdated application installed or run outdated operating systems, making themselves vulnerable to online threats and known security vulnerabilities/exploits. Security vendor Avast has released its PC Trends Report 2019 revealing that millions of users are making themselves vulnerable...

Charity Scams to Watch Out for During the Holidays

‘Tis the season of giving, which means scammers may try to take advantage of your good will. A surprising fact about American donation habits is that everyday folks like yourself are the single largest driver of charitable donations in the United States. Giving USA’s Annual Report on Philanthropy found that...

Hackers hide cryptocurrency mining malware in Adobe Flash updates

Cryptocurrency scammers have gotten extra creative and are now hiding mining malware in legitimate updates of Adobe Flash Player. Researchers from cybersecurity firm Palo Alto Networks discovered a fake Flash updater which has been doing the rounds since early August. While it claims to install a legitimate Flash update, the malicious file...