5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays

The holiday shopping season offers myriad opportunities for threat actors to exploit human nature and piggyback on the rush to buy and sell products in massive quantities online. Our previous post covered some network security basics for retailers. Let’s take a closer look at how retailers can properly configure and monitor their networks to help…

Best antivirus software: 14 top tools

The AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Only six of the 18 products tested earned a perfect rating of 6 for each of those criteria: Bitdefender Endpoint Security 6.6, Kaspersky Lab Endpoint Security 11, Kaspersky Small Office Security 6, Microsoft Windows…

Zuckerberg Defends Facebook in New Data Breach Controversy

A British parliamentary committee investigating whether the social media behemoth was being used to manipulate the results of elections published 250 pages of internal Facebook documents earlier Wednesday. They show executives holding discussions about big companies such as Netflix being granted preferential access to user data even after Facebook had tightened its privacy rules in…

Backdoors Up 44%, Ransomware Up 43% from 2017

Backdoor and ransomware detections increased 44% and 43%, respectively, in 2018, the same year nearly 30% of computers faced at least one malicious threat online, researchers report. The Kaspersky Security Bulletin 2018 found malware should be among everyone’s top concerns as we head into the new year. Kaspersky Labs handled 346,000 new malicious files each…

7 warning signs of an insider threat

Employees conducting attacks on their own employees – known as insider threats – are becoming increasingly common and costly. According to a CA report, over 50 percent of organizations suffered an insider threat-based attack in the previous 12 months, while a quarter say they are suffering attacks more frequently than in the previous year. Ninety…

Making it harder for attackers to know when a system begins to deceive a bad actor

Can you deceive a deceiver? That’s the question that computer scientists at Binghamton University, State University of New York have recently been exploring. Assistant Professor of Computer Science Guanhua Yan and PhD student Zhan Shu are looking at how to make cyber deception a more effective tool against malicious hackers. Their study was inspired by…