For many years, the web browser has been the most dangerous piece of software on a computer. They have blindly trusted the content served to them by virtually any site, allowed users to be hit by all manner of malware and drive-by downloads and generally been that friend you don’t want to follow down a sketchy side street.
The Industry’s Only SaaS-Delivered Enterprise DLP
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
No-Compromise Data Protection is:
- Cross Platform
- Flexible Controls
The Android versus Apple argument has become this decade’s version of the PC versus Mac or Magic versus Bird debates. The people on both sides are entrenched in their positions, and trying to tell an Apple user about the benefits of Android, or vice versa, is likely to start a bar fight. Or a Twitter beef at the very least.
If you’ve been paying any semblance of attention lately, you’ll know that the level of ransomware activity is reaching epidemic levels. It’s pretty much out of hand, honestly. And, unfortunately there doesn’t seem to be any great defensive hope on the horizon.
There are relatively few things we know for certain in the security industry, but one of them is that the password has become nearly useless as an authentication mechanism. Users are bad at creating them and modern computing resources have advanced to the point that attackers have little trouble cracking even complex passwords.
The Internet of Things, along with being one of most profoundly stupid phrases of all time, is also profoundly broken from a security perspective. Your dishwasher and your car are probably several firmware versions out of date, and your light bulbs are likely communicating with your smart home hub over a cleartext connection. It’s ugly out there.
Your passwords are crap.
Phishing emails that impersonate the CEOs of targeted businesses are on the rise and highly effective, according to a new warning from the FBI.
Will scrutiny from government agencies catalyze changes to mobile phone security updates?
Attackers are nothing if not creative, and when one path of entry is taken away, they will find another. We’ve seen this many times over the years, whether it’s with malware or vulnerabilities or something else, and the latest example is the reaction by cybercriminals to the move to chip-and-PIN (EMV) cards.
Anyone who has kids of a certain age is likely familiar with the constant fight to get them to put down their damn iPads and Xbox controllers and go outside or read a book. The struggle is real, and it’s only becoming more difficult as computing and electronics become ever more pervasive parts of modern life.