Building an incident response program: creating the framework

An incident response plan does not need to be overly complicated. However, having a solid and tested framework for the program is key in the ability of an organization to respond to and survive a security incident.
Categories:

101
Business

Tags… Continue reading Building an incident response program: creating the framework

Human Factor Podcast: Jenny Radcliffe and Chris Boyd

Hear Lead Malware Intelligence Analyst Chris Boyd talk about 10 years of experience in security and research on the Human Factor podcast hosted by Jenny Radcliffe.
Categories:

101
FYI

Tags: human factor podcastjenny radcliffemany hats clubpodc… Continue reading Human Factor Podcast: Jenny Radcliffe and Chris Boyd

How to protect your computer from malicious cryptomining

When you experience a slow computer due to malicious cryptomining, how can you troubleshoot it and prevent it from happening again?
Categories:

101
How-tos

Tags: Chrome Task managercrypto-jackinghigh cpupreventslow computertroubleshoot

(Read… Continue reading How to protect your computer from malicious cryptomining

How to build an incident response program: GDPR guidelines

With the General Data Protection Regulation (GDPR) going into effect this May, many organizations need to have a robust incident response program to ensure the safety of their customers’ and employees’ data. Here’s part one of our guid… Continue reading How to build an incident response program: GDPR guidelines

How to build an incident response program: GDPR guidelines

With the General Data Protection Regulation (GDPR) going into effect this May, many organizations need to have a robust incident response program to ensure the safety of their customers’ and employees’ data. Here’s part one of our guid… Continue reading How to build an incident response program: GDPR guidelines

Encryption 101: a malware analyst’s primer

A primer on encryption mechanisms and how they are exploited by malware authors, including an introduction to encryption and the main methods used to encrypt ransomware.
Categories:

Threat analysis

Tags: 101encryptionransomware

(Read more…… Continue reading Encryption 101: a malware analyst’s primer

Stop telephoning me-eh-eh-eh-eh: robocalls explained

The Federal Communications Commission (FCC) has identified robocalls as the number one complaint from the public. In this post, we tell you what you need to know to protect against the nasty ones.
Categories:

101
FYI

Tags: Explainedfraudphone s… Continue reading Stop telephoning me-eh-eh-eh-eh: robocalls explained

Stolen security logos used to falsely endorse PUPs

To gain the trust of users, the makers of PUPs put the logos of reputable security and tech firms on their websites to imply their product is endorsed by the companies. They are not.
Categories:

101
Social engineering

Tags: logosMcAfeemicrosoft… Continue reading Stolen security logos used to falsely endorse PUPs

How to remove adware from your PC

Half the battle in avoiding adware is reading install wizards and EULAs very carefully. But let’s be real: no one does that. Here’s how to remove adware from your PC in a few easy steps.
Categories:

101
How-tos

Tags: adwareAdwCleanerhow to remo… Continue reading How to remove adware from your PC

Cybersecurity New Year’s resolutions, you say? Why not.

It’s no surprise that our resolutions are usually about health, finances, relationships, and self-improvement. As all of us live digital lives, too, why not think up cybersecurity New Year’s resolution that concern our online health and safe… Continue reading Cybersecurity New Year’s resolutions, you say? Why not.