How to build a proactive incident response plan

Organizations have long since relied on a reactive approach to cybersecurity. However, with the ever-increasing sophistication of tools for malicious actors, a reactive approach may lead to disaster. A single…

Mozilla ends support for Firefox Lockwise password management app, strands iOS users

Farewell, sweet prince. Image: Mozilla Mozilla has emailed its Lockwise users to inform them that on December 13, it will be ending support for its Lockwise password management app. Lockwise…

Less than Half of Consumers Change Passwords Post-Breach

Less than Half of Consumers Change Passwords Post-Breach There’s a “shockingly high” disconnect between awareness of best practices following a data breach and actions taken, according to a new study…

Rooting Malware Is Back for Mobile. Here’s What to Look Out For.

Hank Schless, senior manager of security solutions at Lookout, discusses AbstractEmu, mobile malware found on Google Play, Amazon Appstore and the Samsung Galaxy Store. Over the last several years, as…

This $29 security key works with your iPhone, Android, or laptop or desktop system

Need a security key to protect your online accounts? Need a security key that will work on iphone, Android, or pretty much any modern laptop or desktop system running Windows,…

New Malware Dubbed AbstractEmu Goes Undetected

A new malware was detected. Named by security researchers AbstractEmu, its attack methods consist of the use of anti-emulation checks and also code abstraction techniques. All these can result in…

How to Stay Safe from BlackMatter Ransomware Attacks

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) all provide data that can assist companies in defending against and…