Navigating the murky waters of Android banking malware

An interview with ESET malware researcher Lukáš Štefanko about Android banking malware, the topic of his latest white paper Banking malware continued to plague the Android platform throughout 2018, with cybercrooks relentlessly targeting users with banking Trojans and fake banking apps, but also experimenting with new money-stealing techniques. To help users navigate the tricky and […]

Read more
The Best Ways to Catch McAfee at RSA Conference 2019

In just a few weeks, San Francisco will be taken over by cybersecurity professionals and vendors at Moscone Center for the 2019 RSA Conference. There’s a lot packed into the conference—that’s why we’re breaking down the best ways to see McAfee in action. So take out your calendars and make note of the events below. […]

Read more
How to Create a Dream Team for the New Age of Cybersecurity

When each member of your security team is focused on one narrow slice of the pie, it’s easy for adversaries to enter through the cracks. Here are five ways to stop them. Today, enterprises consist of complex interconnected environments made up of infrastructure devices, servers, fixed and mobile end-user devices and a variety of applications […]

Read more
Hashtag Trending – DNA matchmaking; Americans lose $143M to online dating scams; 3D-printed avacado with emotions

“This podcast is brought to you by Amazon Web Services. Companies build more of their IT infrastructure on AWS than the next four cloud providers combined. Visit aws.amazon.com to learn how AWS can help you modernize your IT.” An online service plays matchmaker based on DNA samples; Americans are not only getting their wallets emptied […]

Read more
Attack at email provider wipes out almost two decades’ worth of data

Instead of financial gain or other, more usual, goals, the attacker leaves ‘scorched digital earth’ behind An unknown attacker has wrought rare havoc on email service provider VFEmail, wiping out all of the company’s data stored in the United States, according to an announcement on the firm’s website. Describing the incident as “catastrophic”, the company […]

Read more
Bomb Threat Hoaxer Exposed by Hacked Gaming Site

Federal authorities this week arrested a North Carolina man who allegedly ran with a group of online hooligans that attacked Web sites (including this one), took requests on Twitter to call in bomb threats to thousands of schools, and tried to frame various online gaming sites as the culprits. In an ironic twist, the accused […]

Read more
The Smart Ways to Correct Mistakes in Git

Share this: The world of software development offers an infinite amount of ways to mess up: deleting the wrong things, coding into dead ends, littering commit messages with typos, are a mere few of the plentitude.​​​​Fortunately, however, we have a wonderful safety net under our feet in the form of Git when we’re working with […]

Read more
Lessons Learned from a Hard-Hitting Security Review

Information security is a corporate posture and must be managed at all levels: systems, software, personnel, and all the key processes. About two years ago, our company found itself in late-stage service contract negotiations, and a mandatory security review as part of the process, with a Fortune 500 technology company in the Bay Area. This […]

Read more
Communications muffled between infosec pros, management: Survey

Communications between all business levels is the heart of a successful organization. However, if a recent nine-country survey of  cyber security professionals is accurate managers in a large number of organizations are still not getting their messages. Only 21 per cent of the nearly 700 respondents felt their security teams are highly effective in communicating security risks […]

Read more
Top