Strong ARM tactics to keep your clients safe

The 64-bit evolution of the ARM architecture family – the efficient and light ARM64 processor – is positioned to become increasingly adopted by businesses. Whatever the use case for adopting ARM-based devices — from real-time GPS tracking and running mobile point-of-sale software to enabling anywhere access to data for essential services workers — a critical … More Strong ARM tactics to keep your clients safe

How scammers target Zelle users – and how you can stay safe

Fraudsters use various tactics to separate people from their hard-earned cash on Zelle. Here’s how to keep your money safe while using the popular P2P payment service. The consumer payments space has undergone a radical shift in recent years. A new breed of apps, including Venmo, Cash App and Zelle, now offer a fast, effective and free … More How scammers target Zelle users – and how you can stay safe

APT group POLONIUM targets Israel with Creepy malware

ESET researchers recently analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group. ESET named the five previously undocumented backdoors with the suffix “-Creep.” According to ESET telemetry, POLONIUM has targeted more than a dozen organizations in Israel since at least September 2021, with the group’s most recent actions … More APT group POLONIUM targets Israel with Creepy malware

The need to change cybersecurity for the next generation

Healthy habits that are instilled and nurtured at an early age bring lifelong benefits – the same applies to good cybersecurity habits. It’s October, it’s Cybersecurity Awareness Month (CSAM), and with it the annual deluge of articles about phishing, passwords, protecting personal data and such like that will be hitting your inboxes very soon (if they have … More The need to change cybersecurity for the next generation