Cisco Router Vulnerability Gives Window into Researchers’ World

The research around a recent vulnerability shows how researchers follow leads and find unexpected results.

Read more

Is it possible for an infected laptop to affect other devices in the same home network?

Short answer: Potentially yes Long answer : AFAIK malware infections can spread (if programmed that way ) to the router/modem

Read more

Advanced Bot Protection, Cequence Security – Business Security Weekly #115

    Shreyans Mehta is the CTO at Cequence Security. Shreyans joins us to talk about advanced bot protection and how Cequence is involved. Full Show Notes Hosts         Announcements RSA Conference 2019 is coming up March 4 – 8 in San Francisco! Go to rsaconference.com/securityweekly-us19 to register now using the discount […]

The post Advanced Bot Protection, Cequence Security – Business Security Weekly #115 appeared first on Security Weekly.

Read more

Leadership Articles – Business Security Weekly #115

    In the Leadership and Communications segment, cybersecurity isn’t just for tech people anymore, the weird approach to leadership, 4 things to do before a tough conversation, and more! Leadership Articles Cybersecurity isn’t just for ‘tech people’ anymore Boardrooms Are Still Not Singing the Security Song Executive interview: The Weird approach to leadership 4 […]

The post Leadership Articles – Business Security Weekly #115 appeared first on Security Weekly.

Read more

Facebook Boots Hundreds of Iran-Linked Accounts For Spreading Misinformation

Facebook is continuing to crack down on misinformation, political meddling, and “coordinated inauthentic behavior” on its platform.

Read more

TheMoon Rises Again, With a Botnet-as-a-Service Threat

A new module allows it to be rented to other malicious actors — and it’s likely other new capabilities are coming down the pike.

Read more

Twitter took down accounts from Iran, Venezuela, and Russia that tried to influence 2018 US midterms

Facebook also removes hundreds of accounts linked to an Iranian political influence campaign.

Read more

The Rise of Information Stealers

Reading Time: ~5 min.This is the second of a three-part report on the state of three malware categories: miners, ransomware, and information stealers.  As noted in the last blog, mining malware is on a decline, partly due to turmoil affecting cryptocurrencies. Ransomware is also on a decline (albeit a slower one). These dips are at least partly the result […]

The post The Rise of Information Stealers appeared first on Webroot Blog.

Read more

Best antivirus software: 11 top tools


The AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Only five of the 16 products tested earned a perfect rating of 6 for each of those criteria: Kaspersky Lab Endpoint Security 11, Kaspersky Small Office Security 6, Symantec Endpoint Protection 14.2 and Endpoint Protection Cloud 22.15, and Trend Micro Office Scan 12. The top 11 antivirus offerings shown here in alphabetical order scored at least 17 points out of a possible 18.

Read more

Prepare to Defend Your Network Against Swarm-as-a-Service

Swarm technology may be a game changer for the bad guys if organizations don’t change their tactics.

Read more