Cloud Consultancy News
62% Of UK firms Lack Full Cybersecurity Insurance
The number of UK firms with cybersecurity insurance has risen in the past year — but less than half say their cyber insurance covers all risks. The second annual cybersecurity survey from research and consultancy firm Ovum, for Silicon Valley analytics firm FICO,...
Google may add Windows 10 dual-boot option to Chromebooks
Google appears to be working on dual-boot support for Chromebooks. XDA-Developers has discovered that Google has been working to support an “alt OS mode” for its Pixelbook laptop for months now. Dubbed “Campfire,” an obvious nod to Apple’s own Boot Camp feature,...
Social Mapper: A Free Tool For Automated Discovery Of Targets’ Social Media Accounts
Trustwave has released Social Mapper, an open source tool that automates the process of discovering individuals’ social media accounts. How Social Mapper works The tool takes advantage of facial recognition technology and searches for targets’ accounts on LinkedIn,...
The FBI Warns About Compromised IoT Devices
The FBI is instructing users on how to recognize when their IoT devices have been compromised and advising them on how to keep them secure. “Compromised devices may be difficult to detect but some potential indicators include: a major spike in monthly Internet usage;...
Intel Planning 9th-Generation 6 and 8 Core CPUs For October Release
Intel is planning to release its ninth-generation Core processors on 1 October, according to fresh reports. The range will include the Core i9-9900K, which will come with 16MB level one cache, eight cores and 16 threads running at a standard 3.6GHz, but capable of...
Back to Basics: Retro Cybersecurity Lessons Still Matter
We are all too familiar with the game of leapfrog being played between cybersecurity personnel and hackers as stories of data theft, identity theft and malware are reported daily. Luckily, technology is often on our side. Machine learning can now watch for strange and...
Examples Of Malware
We've already discussed some of the current malware threats looming large today. But there is a long, storied history of malware, dating back to infected floppy disks swapped by Apple II hobbyists in the 1980s and the Morris Worm spreading across Unix machines in...
How To Detect Malware
It's fully possible—and perhaps even likely—that your system will be infected by malware at some point despite your best efforts. How can you tell for sure? When you get to the level of corporate IT, there are also more advanced visibility tools you can use to see...
Malware Protection
Antivirus software is the most widely known product in the category of malware protection products; despite "virus" being in the name, most offerings take on all forms of malware. While high-end security pros dismiss it as obsolete, it's still the backbone of basic...
How To Prevent Malware
With spam and phishing email being the primary vector by which malware infects computers, the best way to prevent malware is make sure your email systems are locked down tight—and your users know how to spot danger. We recommend a combination of carefully checking...