Tech support scammers and their banking woes

We all know about tech support scams by this point. We know how they cold call, lie their way into your computer, and steal your money. Unfortunately for the scammers, banks know this as well, making it quite difficult at times to maintain an account to store the criminal’s ill-gotten gains. So how does the…

Insider Threat Fear Greater Than Ever, Survey Shows

More than half of security pros say insider threat incidents have become more frequent in the past 12 months. Despite continued spending on security measures for controlling and monitoring access to sensitive data, more organizations than ever feel vulnerable to breaches caused by insiders with legitimate access to enterprise systems.

Free Nintendo Switch emulators are fake

Fake emulators for newly released Nintendo console used as bait to get users to fill out survey scams and download potentially unwanted applications. Over the last few weeks, scammers have been trying to dupe users into believing that a software emulator exists for the Nintendo Switch, the company’s newest console that was released on March…

Most Android devices lack latest security patches

Nearly three-quarters of Android devices on the five biggest U.S. carriers are running on security patches that are at least two months old, putting them at greater risk of being hacked. That finding was made in an analysis released Thursday by Skycure, a mobile threat defense vendor. The report also found that the city of Boston…

Don’t forget to pack security for the journey to the cloud

When you move workloads to public cloud platforms, you offload many tasks on the cloud provider, but don’t fall for the misconception that you’re entirely off the hook with security. Although cloud providers “rent” their computing infrastructure to you, they operate on a “shared security responsibility” model, meaning you still must protect your workloads in…

Top 4 Software Development Methodologies

Successful projects are managed well. In order to manage a project efficiently, the manager or dev team must choose which software development method works best for the project at hand. All of the numerous software development methodologies that exist are used for different reasons. I’ve been doing some research to understand why different methodologies exist,…

Explained: Packer, Crypter, and Protector

In this article, we will try to explain the terms packer, crypter, and protector in the context of how they are used in malware. Bear in mind that no definitions for these categories are set in stone and that they all have overlap and that there are exceptions to the rules. But this is the…

A new approach is needed in the battle against cyber attacks

How do you search for something that’s invisible? An increase in the sophistication of cyber attacks means that it takes an average of 146 days before a corporate hack is discovered. Modern breaches are a mix of chameleonic deception and clever automation, enabling malicious code to be concealed deep inside the corporate network. In the…