Eliminate Threats to Your Domain with a Registry Lock

DNS attacks are up 34%, according to IDC’s annual threat report. Here’s what to know about the growing need for domain safety. In 2019, several leading security organizations, including corporations…
The post Eliminate Threats to Your Do… Continue reading Eliminate Threats to Your Domain with a Registry Lock

SQL Injection Attack: What It Is & How to Protect Your Business

Web-applications attacks, including SQL injection attacks, more than doubled in 2019, according to data from SonicWall Taking into account the trends for more and more businesses going online, the number…
The post SQL Injection Attack: What It Is &#… Continue reading SQL Injection Attack: What It Is & How to Protect Your Business

Social Engineering Attacks: A Look at Social Engineering Examples in Action

Social engineering is a commonly used tactic that was used in 33% of data breaches in 2018, according to Verizon’s 2019 Data Breach Investigation Report — here’s what social engineering…
The post Social Engineering Attacks: A Look … Continue reading Social Engineering Attacks: A Look at Social Engineering Examples in Action

Automotive Cyber Security: A Crash Course on Protecting Cars Against Hackers

Modern vehicles have up to 50 different automotive IoT devices (computers) hackers can attack. That’s why vehicle cybersecurity is critical for automobile safety… Modern cars have dozens of computers on…
The post Automotive Cyber Securit… Continue reading Automotive Cyber Security: A Crash Course on Protecting Cars Against Hackers

Coronavirus Scams: Phishing Websites & Emails Target Unsuspecting Users

As COVID-19 fears grow, hundreds of Coronavirus-themed domains are being used to spread malware and steal information Amongst growing fears of this global pandemic, Coronavirus scams and malicious websites are…
The post Coronavirus Scams: Phishing W… Continue reading Coronavirus Scams: Phishing Websites & Emails Target Unsuspecting Users

Juice Jacking: How Hackers Can Steal Your Info When You Charge Devices

Never thought you’d have to worry about cyberattacks from just plugging in your phone at a charging station? Here’s what to know about it and how to protect your devices…
The post Juice Jacking: How Hackers Can Steal Your Info When You C… Continue reading Juice Jacking: How Hackers Can Steal Your Info When You Charge Devices

Browser Watch: Google Chrome to Block HTTP Downloads

Starting mid-2020, you won’t be able to download certain files on Chrome — here’s why Time after time, we’ve witnessed browser giants making security-related decisions that have a significant impact…
The post Browser Watch: G… Continue reading Browser Watch: Google Chrome to Block HTTP Downloads

The 11 Best Cyber Security Books — Recommendations from the Experts

We asked 11 cybersecurity pros for their favorite cybersecurity books — here’s what they recommend Criminals. Mystery. Danger. Money. Technology. Sextortion. While all of these things together sound like the…
The post The 11 Best Cyber S… Continue reading The 11 Best Cyber Security Books — Recommendations from the Experts

DigiCert Leads Initiative to Enhance EV SSL Certificates

In collaboration with several other certificate authorities, DigiCert has proposed 4 enhancements to the EV SSL validation processes “On the Internet, nobody knows you’re a dog.” Cartoonist Peter Steiner penned…
The post DigiCert L… Continue reading DigiCert Leads Initiative to Enhance EV SSL Certificates

Fake Jobs: Cybercriminals Prey on Job Seekers via Fake Job Postings

The FBI reports that fake job listings get people to hand over personal information to cybercriminals and results in an average financial loss of $3,000 per victim Earn $10,000 a…
The post Fake Jobs: Cybercriminals Prey on Job Seekers via Fake Job P… Continue reading Fake Jobs: Cybercriminals Prey on Job Seekers via Fake Job Postings