It’s Only A Hacker If It’s Linus Himself

December 12, 2017 | Laureen Hudson
November 21, 2017 | Kanika Sharma

Keystroke Logging - How it Affects the Online Privacy of Internet Users

Besides being a useful tool to study human-computer interaction, keystroke logging or keylogging is one of the most dangerous cyber threats for online users. Designed to covertly log everything a user types using the keyboard, keyloggers can silently steal and pass on your sensitive information to cybercriminals. Not just the websites you browse or the queries you google on, but…

November 20, 2017 | Bob Covello

Adjusting Your Baseline

I went to the doctor the other day and she noted that my numbers were a little higher than last year.  I asked, “Hey Doc, should I be concerned?”  “Not really”, she said.  She then went on to explain that as humans age, the numbers will shift to reflect the differences in our…

Get the latest security news in your inbox.

Subscribe via Email

November 17, 2017 | Javvad Malik

Things I Hearted this Week 17th Nov 2017

It’s another week, another roundup. I wasn’t able to publish last week as I travelled to Portugal for Bsides Lisbon. You can read all about my adventures, see a video recap, and a recording of my keynote here. But the TL;DR version is that Lisbon is a lovely city, and Bsides was a great event. …

November 16, 2017 | Javvad Malik

BSides Lisbon and the Global Community

I was honoured to be asked to keynote at BSides Lisbon in Portugal this year. It’s no secret that I’m a big fan of BSides conferences. No matter where you are in the world, BSides events are consistently good. It’s like having a can of your favourite beverage - no matter where you are…

November 15, 2017 | John Maguire

Powering the Cisco Threat Intelligence Director with AlienVault OTX Threat Data

We built the AlienVault® Open Threat Exchange® (OTX™) to disrupt the traditional information siloes in the threat intelligence community, making threat intelligence open and free for anyone to share and consume, including security researchers, IT security professionals, ISACs, and academic and other institutions. Today, OTX has 65,000+ global participants in 140 countries who contribute over 14 million threat artifacts daily.…

November 15, 2017 | Javvad Malik

Steve Ragan: Writing for Impact

Steve Ragan has been covering the security industry for longer than some people have been working in it. More than a journalist, Steve is an active participant in the community and is often found at security conferences helping out and exchanging stories – all with a cheeky grin that radiates a youthful playfulness.Steve, you've been covering information security /…

November 14, 2017 | Vineetha Paruchuri

“Prime”-ing for Amazon and Other IoT Devices

There seems to be all sorts of advice on the Internet on how to secure IoT devices. When not advertising products that could “protect all your Internet-connected home devices from hackers”, much of the user-targeted advice found online seems to be centered around very basic security advice such as strong passwords, two factor authentication (2FA), software/firmware updates,…

November 13, 2017 | Mike Duffy

Busting 5 Myths About Fileless Attacks

The threat landscape is constantly evolving, and we’re currently seeing a growing number of cyber criminals making a fundamental change in the way they carry out their attacks. Rather than installing executable files via phishing that antivirus solutions can easily scan and detect, they’re utilizing exploits, scripts, and otherwise legitimate administration tools to run malicious code…

November 9, 2017 | Chris Doman

LockCrypt Ransomware Spreading via RDP Brute-Force Attacks

We previously reported on SamSam ransomware charging high ransoms for infected servers. But SamSam isn’t the only ransomware out there charging eye-watering amounts to decrypt business servers.Initial reports of a new variant of ransomware called LockCrypt started in June of this year. In October we saw an increase in infections.LockCrypt doesn’t have heavy code…

November 8, 2017 | Samantha Duncan

LockCrypt ransomware spreading via RDP Brute-Force attacks

We previously reported on SamSam ransomware charging high ransoms for infected servers. But SamSam isn’t the only ransomware out there charging eye-watering amounts to decrypt business servers.Initial reports of a new variant of ransomware called LockCrypt started in June of this year - and there has been an increase in cases we’ve seen in October. …

November 7, 2017 | Danielle Russell

New AlienVault USM Anywhere™ Editions Expand Pricing and Deployment Flexibility for All

AlienVault was founded on the belief that every organization deserves a strong security posture, regardless of the size of their IT environment or the size of their IT security budget. We pioneered Unified Security Management® (USM) so that resource-limited IT security teams could meet their security and compliance goals without the cost and complexity of managing multiple point…

November 6, 2017 | Blade Soriano

How to Prepare to Take the OSCP

My whole career, I’ve always wanted to gear it towards information security. I’m always looking for ways to improve my skills in penetration testing. My hunger for knowledge and my odd craving for challenges that push me to my limits have remained insatiable. Proving something to me is important, as are establishing my InfoSec credentials.. Those…

Watch a Demo ›
GET PRICE FREE TRIAL CHAT