Articles

  • 3 days ago | thedailyupside.com | Ray Fernández

    Practically every enterprise worker is using all kinds of unsanctioned apps, AI programs, and browser extensions. A recent report from LayerX Security found that 99% of enterprise employees have at least one browser extension installed on their workstations, which can pose significant security and privacy risks. More than half of these extensions have access to highly critical resources, such as company passwords, sensitive files, browser data, and more.

  • 6 days ago | moonlock.com | Ray Fernández

    Botnets have been around since the early days of the internet and remain one of the world’s most threatening cybersecurity issues. A cyber botnet has only one basic requirement: an internet connection. Once connected, the possibilities of what it can do are as endless as they are scary. But what are botnet attacks anyway? And what can you do about them? A simple botnet definition would be to compare it to multiple computers being harnessed together to carry out a specific task.

  • 6 days ago | moonlock.com | Ray Fernández

    There are many types of malware out there, but one of the most destructive types can self-duplicate and jump from network to network. Highly favoured by cybercriminals, this malware can be extremely difficult to locate. It’s called a computer worm. It’s one of the most insidious examples of malware out there, and it’s only getting worse.

  • 1 week ago | moonlock.com | Ray Fernández

    It’s no secret that high-level iPhone users, such as journalists, human rights activists, government opposition, and other groups, are targeted with spyware like Pegasus. From time to time, Apple sends out notifications to users around the world, warning that they are under spyware siege. Apple doesn’t stop at security notifications. Lockdown Mode, for example, is a security feature developed specially to help protect these types of targeted users.

  • 1 week ago | moonlock.com | Ray Fernández

    Remember when the FBI warned us not to charge our phones in airports, shopping malls, and public spaces? We haven’t heard much about this type of cyberattack for some time now, but “juice jacking” is back on the threat landscape. The term “juice jacking” was coined in 2011 when security researchers figured out that cybercriminals were modifying phone charging stations in public spaces to install spyware or steal data from victims.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →