Smominru botnet infects 4,700 new PCs daily
The botnet generally propagates through EternalBlue, the same vulnerability that made the WannaCry and NotPetya outbreaks possible.
3984 articles
The botnet generally propagates through EternalBlue, the same vulnerability that made the WannaCry and NotPetya outbreaks possible.
On this podcast, Jeff is joined by Oksana, Kate, Julia and Anya in Moscow to discuss what privacy means to them.
We surveyed almost 5,000 business decision-makers willing to share their thoughts on cybersecurity and their firms’ attitudes about cyberthreats.
What cyberimmunity means in practice and in the industrial infrastructure environment.
According to recent news, quantum supremacy is reached. What should we do about it?
Jeff and Dave discuss the reduction of human listening for Google Home, AI being used in schools, TikTok scams, and more.
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity
Toyota’s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.
Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!
Jeff and Dave discuss the latest hurdles for the Equifax breach settlement, Entercom being hit with ransomware, and more.
Is there Internet on the ISS, what is it like, and how long does it take to get a message from Mars — learn about the networks of today and the future.
In case of a cybersecurity incident, whom should you communicate with inside the company? Which channels should you use — and which ones should you avoid? And how should you react?
Jeff and Dave discuss headaches caused by Tesla’s app going down, YouTube violating child privacy laws, and more.
There’s no malware in the official Android store, right? We get to the bottom of this claim.
Small businesses may not be the main target of cybercriminals, but it does not mean an SMB will not fall victim to a supply-chain attack. How not to become collateral damage.
Cheats for multiplayer games are tantamount to malware, and their use in competitions to cybercrime.
Chrome and Firefox extensions can collect your browsing history. Learn why this is dangerous and how to protect yourself.