Latest from James Sanders
-
Have tech companies taken two-factor authentication too far?
Apple is facing a lawsuit from a user claiming that two-factor authentication is a "waste of their personal time." Here's why businesses shouldn't ignore the security measure.
-
Cryptocurrency-stealing Clipper malware caught in Google Play Store, here's how to avoid it
Cybercriminals are modifying wallet IDs copied to the clipboard in hopes that users will accidentally transfer funds to the wrong account.
-
Malicious URLs outnumbered attachments in emails 3 to 1 last year
The end of 2018 saw a spike in malicious attachments which businesses need to be wary of, according to a Proofpoint report.
-
3 ways state actors target businesses in cyber warfare, and how to protect yourself
State-sponsored groups are leveraging weaknesses in IoT devices to build botnets, and attacking private industry and public infrastructure in attacks, according to a Booz Allen report.
-
Why you need to use DMARC and SPF on mail servers to prevent phishing and fraud
Open-source, industry standard specifications are available to protect your business, but real-world deployment is still lower than optimal.
-
Spectre and Meltdown explained: A comprehensive guide for professionals
Staying up to date on Spectre and Meltdown can be challenging. This guide includes in-depth explanations about these uniquely dangerous security vulnerabilities and the best mitigation solutions.
-
6 reasons hackers target businesses: Is your organization in the line of fire?
Cyberattacks are increasing, and your organization may be making itself a high-profile target for attackers, according to a Radware report.
-
Mac malware steals cryptocurrency exchange cookies, text messages for 2FA authentication
The CookieMiner malware attempts to extract credentials for cryptocurrency wallets and exchanges, as well as stored password and credit card information.
-
Apple revokes Facebook's ability to deploy apps internally amid privacy scandal dispute
What happens when you get kicked out of Apple's Enterprise Developer program? Facebook is finding out the hard way.
-
New DDoS campaign serving four times the number of packets as 2018's major GitHub attack
The potency of DDoS attacks lies in the number of packets being sent rather than the relative bandwidth involved in the attack.