Tips for safe summer travels: your cybersecurity checklist

A cybersecurity checklist for when you are about to travel or go on vacation, helps to prevent data-loss and other security issues.
Categories:

Privacy
Security world

Tags: backupcybersecurity checklistdata-lossdevicesIoT

(Read more…)

Continue reading Tips for safe summer travels: your cybersecurity checklist

SEO poisoning: Is it worth it?

Is SEO poisoning a thing of the past or are there still effective ways to fool Google’s algorithms and rank high in the search results using black hat methods?
Categories:

Business
Hacking

Tags: black hat seolink buildingsearch engine optimizat… Continue reading SEO poisoning: Is it worth it?

GDPR causes a flood of new policies

The upcoming GDPR deadline means you’ve probably seen an influx of changed policy announcements in your inbox. Here’s why you might want to pay attention to the changes.
Categories:

Privacy
Security world

Tags: gdprGeneral Data Protection Regul… Continue reading GDPR causes a flood of new policies

HTTPS: why the green padlock is not enough

Cheap hosting deals offering free certificates have made the green padlock a less convincing sign of security. Here’s what to look for to ensure a website is safe to visit.
Categories:

101
FYI

Tags: cacertificatesextended validationgreen padloc… Continue reading HTTPS: why the green padlock is not enough

Facebook spammers making things worse

Adding to Facebook’s burden are two spam campaigns. One is aimed at Finnish users and the other was quickly terminated, but we expect both to resurface in one form or another.
Categories:

Cybercrime
Social engineering

Tags: facebookFaceboo… Continue reading Facebook spammers making things worse

Malicious gaming extensions: a child’s play to infection

Some gaming portals have been preying on children to get their malicious extensions installed. They use targeted advertizing and offer (already) free games as a reward for installing their adware.
Categories:

Cybercrime
Social engineering

Tags:… Continue reading Malicious gaming extensions: a child’s play to infection

DDoS attacks are growing: What can businesses do?

How do DDoS attacks work? And how do we protect our organizations from the growing size and number of attacks?
Categories:

Business
Technology

Tags: attackddosDDos attackIoTmemcachedPieter Arntzprotection

(Read more…)

The post DDoS … Continue reading DDoS attacks are growing: What can businesses do?

How artificial intelligence and machine learning will impact cybersecurity

Both artificial intelligence and machine learning are being adopted in cybersecurity. But before they achieve mainstream traction, it’s important to discuss their impact to the industry.
Categories:

Security world
Technology

Tags: adversarialAI… Continue reading How artificial intelligence and machine learning will impact cybersecurity