Remove Ebola Ransomware (.101 Extension)

This article will aid you remove Ebola ransomware efficiently. Follow the ransomware removal instructions at the end. Ebola is the name of a ransomware cryptovirus. The ransomware is a variant of HiddenTear and is written to append the extension .101….. Continue reading Remove Ebola Ransomware (.101 Extension)

Jason Albuquerque, Carousel Industries – Business Security Weekly #101

Michael and Paul ask Jason how to become a better business. Jason explains how to run your security team as in a ‘fish bowl’, and how to apply this technique to your clients and their business. Full Show Notes Hosts
The post Jason Albuquerq… Continue reading Jason Albuquerque, Carousel Industries – Business Security Weekly #101

The digital entropy of death: BSides Manchester

What happens to online accounts when we die? Not a cheerful subject by any stretch of the imagination, but one we covered at BSides Manchester.
Categories:

101

Tags: after we diebsidesBSides Manchesterdeathdigital entropy of deathdigital real e… Continue reading The digital entropy of death: BSides Manchester

The enemy is us: a look at insider threats

It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who’s been in and out the office for weeks now. Or, maybe it could be you. It could be the engineer in th… Continue reading The enemy is us: a look at insider threats

Back to school cybersecurity: hints, tips, and links for a safer school year

Term time is upon us once more, and soon the summer holidays will be a thing of the past. We offer up some handy hints and tips for better back to school cybersecurity, and link to numerous resources of our own to help parents and kids have a safe… Continue reading Back to school cybersecurity: hints, tips, and links for a safer school year

8 everyday technologies that can make you vulnerable to cyberattacks

The security vulnerabilities of the latest developments in tech have been well documented. But what about everyday technologies that have been around for a while or are widely adopted? Here are eight commonly-used tech conveniences that are not as… Continue reading 8 everyday technologies that can make you vulnerable to cyberattacks

The danger of third parties: ads, pipelines, and plugins

We take a look at the perils of the tools and services embedded into the websites you use on a daily basis, thanks to the development help of third parties.
Categories:

101
FYI

Tags: ad networksadsbreachphonespipelinesupply chainthird party

Continue reading The danger of third parties: ads, pipelines, and plugins

A primer: How to stay safe on Amazon’s Prime Day Sale

While Amazon is poised for its fourth year run of Prime Day, the e-commerce giant’s annual flash sales event for Prime members, shoppers on the hunt for bargain deals are ready and revving, too. But before you review your shopping list, let … Continue reading A primer: How to stay safe on Amazon’s Prime Day Sale

When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained

Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most of us, man-in-the-middle embodies something both familia… Continue reading When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained

So you’ve been asked to start a threat intel program

What are the bumps in the road you can expect and avoid when setting up a threat intel progarm for your business?
Categories:

Business
How-tos

Tags: 101remediationThreat Intel

(Read more…)

The post So you’ve been asked to start… Continue reading So you’ve been asked to start a threat intel program