May 12, 2021

“What Bitcoin was to 2011, NFTs are to 2021.” That’s a claim from the highly respected “techno-geek” bible Ars Technica in it’s wonderful explainer on NFTs, or non-fungible tokens. Since cryptocurrencies were, are and will continue to be impactful technologies, surely NFTs are a topic worth exploring. They exploded into public consciousness this year as […]

The post Another NFT explainer, with a bonus look at the data security implications appeared first on Webroot Blog.

Read More Another NFT explainer, with a bonus look at the data security implications

Although they didn’t always call themselves a managed service provider, that’s exactly what T-Consulting has been since its inception. According to Vera Tucci, founder and CEO of the Italy-based MSP, it was her mission to give her clients more than a basic hardware/software bundle with a few hours of IT consultation. She knew her clients […]

The post How MSPs can use Webroot Cyber Resilience Solutions to Get their Time Back appeared first on Webroot Blog.

Read More How MSPs can use Webroot Cyber Resilience Solutions to Get their Time Back

After the introduction of CCPA and GDPR, much more attention is given to third-party risks, and the privacy terms and conditions users agree to.  Global privacy regulations, such as the CCPA and GDPR, were enacted to ensure stricter standards when handling the personal data of consumers. As per these regulations, organizations can be held responsible […]

The post How Companies Need to Treat User Data and Manage Their Partners appeared first on Security Affairs.

Read More How Companies Need to Treat User Data and Manage Their Partners

Aging infrastructure in the United States is not confined to crumbling roads and bridges. Recent events have shown that connected devices in our pipelines, water treatment facilities and power grids are also vulnerable to exploitation. As of now, we still don’t know much about the ransomware attack against the operators of the Colonial Pipeline. Details […]

The post Targeted assets: The need for cyber resilient infrastructure appeared first on Webroot Blog.

Read More Targeted assets: The need for cyber resilient infrastructure

Manchester City win the Carabao Cup Final, many illegal streamers lose The COVID pandemic has led to a surge in content consumption as people stayed home and turned to Netflix, Youtube and other streaming services for entertainment. Not everyone agrees with paying for the latest episode or album, however, and this rise has ran parallel […]

The post We explored the dangers of pirated sport streams so you don’t have to appeared first on Webroot Blog.

Read More We explored the dangers of pirated sport streams so you don’t have to

Microsoft Patch Tuesday for May 2021 security updates addressed 55 vulnerabilities, four are rated as Critical. Microsoft Patch Tuesday for May 2021 security updates address 55 vulnerabilities in Microsoft Windows, .NET Core and Visual Studio, Internet Explorer (IE), Microsoft Office, SharePoint Server, Open-Source Software, Hyper-V, Skype for Business and Microsoft Lync, and Exchange Server. Four […]

The post Microsoft Patch Tuesday for May 2021 fix 4 critical flaws appeared first on Security Affairs.

Read More Microsoft Patch Tuesday for May 2021 fix 4 critical flaws

Security researcher discovered a series of flaws, collectively tracked as FragAttacks, that impact the WiFi devices sold for the past 24 years. Belgian security researcher Mathy Vanhoef disclosed the details of a multiple vulnerabilities, tracked as FragAttacks, that affect WiFi devices exposed them to remote attacks. Some the flaws discovered by the experts date back as […]

The post FragAttacks vulnerabilities expose all WiFi devices to hack appeared first on Security Affairs.

Read More FragAttacks vulnerabilities expose all WiFi devices to hack

Thousands of public-facing devices can be accessed anywhere in the world, from the US to Russia, from London to Johannesburg. Our research shows that large and small manufacturers are identifiable, with Aastra-Mitel topping the list. As with many inventions of the 20th century, the internet has drastically changed using the phone. Once a vital necessity […]

The post Maybe don’t call Saul? Over 30,000 VoIP devices identifiable worldwide, some with suspected vulnerabilities appeared first on Security Affairs.

Read More Maybe don’t call Saul? Over 30,000 VoIP devices identifiable worldwide, some with suspected vulnerabilities

The cybersecurity landscape has fundamentally changed, as evidenced by large-scale, complex attacks like Nobelium, Hafnium, and more recently last week’s Colonial Pipeline attack, which signals that human-operated ransomware is on the rise. Hackers launch an average of 50 million password attacks every day—579 per second. Phishing attacks have increased. Firmware attacks are on the rise,…

The post Securing a new world of hybrid work: What to know and what to do appeared first on Microsoft Security.

Read More Securing a new world of hybrid work: What to know and what to do

Malware researchers from Cleafy warn of a new Android banking trojan dubbed TeaBot (aka Anatsa) that is targeting banks in Europe. Malware experts from the Italian cybersecurity firm Cleafy have spotted a new Android banking trojan dubbed TeaBot (aka Anatsa) that is targeting banks in Spain, Germany, Italy, Belgium, and the Netherlands. TeaBot malware appeared […]

The post TeaBot Android banking Trojan targets banks in Europe appeared first on Security Affairs.

Read More TeaBot Android banking Trojan targets banks in Europe