The Ransomware Threat isn’t Over. It’s Evolving.

Reading Time: ~6 min.This is the third of a three-part report on the state of three malware categories: miners, ransomware and information stealers. Ransomware is any malware that holds your data ransom. These days it usually involves encrypting a victim’s data before asking for cash (typically cryptocurrency) to decrypt it. Ransomware ruled the malware world since late 2013, but finally […]

The post The Ransomware Threat isn’t Over. It’s Evolving. appeared first on Webroot Blog.

Read more

What MWC 2019 Shows Us About the Future of Connectivity

The time has come to say goodbye to Barcelona as we wrap up our time here at Mobile World Congress (MWC). Although it’s hard to believe that the show is already over, MWC 2019 managed to deliver a slew of showstoppers that captured our attention. Here are some of my main takeaways from the event: […]

The post What MWC 2019 Shows Us About the Future of Connectivity appeared first on McAfee Blogs.

Read more

Dow Jones watchlist of high-risk businesses, people found on unsecured database


Security researcher Bob Diachenko discovered an unprotected 4.4GB Elasticsearch database chock-full of more than 2.4 million records of people and businesses considered to be high-risk by Dow Jones. A third-party company left this Dow Jones watchlist on a public server without even so much as a password to protect it.

The proprietary watchlist, hosted on Amazon Web Services (AWS), includes “special interest persons,” current and past politicians, people with terrorism links, sanctioned companies and individuals, as well as those convicted of financial crimes, according to TechCrunch.

To read this article in full, please click here

Read more

A Cybersecurity Checklist for Modern SMBs

Reading Time: ~5 min.The landscape of digital security is rapidly shifting, and even the largest tech giants are scrambling to keep up with new data regulations and cybersecurity threats. Small to medium-sized businesses (SMBs) are often left out of these important conversations, leaving themselves — and their users — vulnerable. In an effort to combat this trend, Webroot […]

The post A Cybersecurity Checklist for Modern SMBs appeared first on Webroot Blog.

Read more