What is fileless malware and how to protect yourself

Some forms of malware are more sophisticated than others, using varying methods of compromise or evasion. Examples include ransomware, wipers, viruses, worms…designed to intrude upon unsuspecting digital victims to steal, damage, or destroy their data. Fileless malware is one of those types that is highly evasive – only working within a computer’s memory, leaving no … More What is fileless malware and how to protect yourself

Cyberattackers could trick scientists into producing dangerous substances

Without ever setting foot in the lab, a threat actor could dupe DNA researchers into creating pathogens, according to a study describing “an end-to-end cyber-biological attack” Researchers have described a theoretical cyberattack that could be used to dupe unsuspecting scientists into producing dangerous biological substances, toxins and synthetic viruses. The paper, authored by researchers from Israel’s Ben-Gurion … More Cyberattackers could trick scientists into producing dangerous substances

Take 5: Essential steps to improve your mobile cyber hygiene

Practising good cyber hygiene is a critical part of staying safe online and protecting yourself from threats such as malware, phishing, viruses, and data loss – and it doesn’t just apply to your desktop or laptop. Our phones hold a vast amount of our personal and professional data, so it’s vital that cyber hygiene practices … More Take 5: Essential steps to improve your mobile cyber hygiene

From Brexit to COVID-19, welcome to scammer central

Dubious websites, business opportunities too good to be true, EU -or- British passports … you name it, it’s on the internet. Using Brexit (Feb. 1, 2020) and the COVID-19 pandemic declaration (Mar. 12, 2020) to bookend our discussion, we still have plenty of fodder to discuss online scams. Scams can aim for anything, from cash … More From Brexit to COVID-19, welcome to scammer central