In the six years since the launch of Discord’s chat and VoIP service, the platform has become a popular tool for building communities of interest, especially among gamers. However, just like any other platform that hosts user-generated content, Discord can be exploited. Discord’s extensive customization options also open the door to attacks on ordinary users, both on and off … [Read more...] about Malware on Discord and how to protect oneself
protect
What you see is what you get … to protect
In my first nearly 90 days since joining Cisco, I’ve spoken with customers from around the world. And one thing that I continue to hear? The shift to a more distributed workforce is driving the need for anywhere, anytime access to resources, wherever they exist. Prior to 2020, many treated “digital transformation” as merely a buzzword — a low priority, at best. Legacy … [Read more...] about What you see is what you get … to protect
How to protect yourself from ransomware: five tips
Recent years have seen ransomware grow from an abstract curiosity into a major problem anyone can face — and that hundreds of thousands of people already have. Now a mass industry, ransomware even shows a division of labor, with some criminals writing malicious code and others selecting targets and using the code to infect them, earning a percentage of the ransom. In the past … [Read more...] about How to protect yourself from ransomware: five tips
What vishing is and how to protect yourself from it
Between tech support requesting access to your computer, concerned tax services specialists demanding payments, medical equipment suppliers “returning your call,” and many more — none legitimate — it’s a wonder anyone even answers their phone anymore. You’d be hard-pressed to find someone who hasn’t experienced some form of phone scam, although the name for it isn’t as … [Read more...] about What vishing is and how to protect yourself from it
Mozilla Says Google’s New Ad Tech—FLoC—Doesn’t Protect User Privacy
Google's upcoming plans to replace third-party cookies with a less invasive ad targeted mechanism have a number of issues that could defeat its privacy objectives and allow for significant linkability of user behavior, possibly even identifying individual users. "FLoC is premised on a compelling idea: enable ad targeting without exposing users to risk," said Eric Rescorla, … [Read more...] about Mozilla Says Google’s New Ad Tech—FLoC—Doesn’t Protect User Privacy
What smishing is and how to protect yourself from it
With smishing all the rage, media in the United States, Italy, and Brazil have been cranking out alarming stories about new scams. The German police even issued an official warning about one such campaign. The phenomenon has raked in massive sums, as evidenced by its search popularity. So, what is smishing? Rise in search popularity of “smishing” on Google in the past few … [Read more...] about What smishing is and how to protect yourself from it
New Framework Released to Protect Machine Learning Systems From Adversarial Attacks
Microsoft, in collaboration with MITRE, IBM, NVIDIA, and Bosch, has released a new open framework that aims to help security analysts detect, respond to, and remediate adversarial attacks against machine learning (ML) systems. Called the Adversarial ML Threat Matrix, the initiative is an attempt to organize the different techniques employed by malicious adversaries in … [Read more...] about New Framework Released to Protect Machine Learning Systems From Adversarial Attacks
Actionable Indicators to Protect a Remote Workforce
Introduction As the world continues to adjust to the new reality of employees working from anywhere and at any time, security teams are working overtime to protect users from cybercriminals that use novel themes and lures to mount attacks. Organizations are faced with a dilemma: Security teams are expected to be aware of the latest global techniques and campaigns, but with … [Read more...] about Actionable Indicators to Protect a Remote Workforce
4 Tips to Protect your macOS Environments
Over the past year, CrowdStrike® Services has observed threat actors increasingly targeting macOS environments — and using relatively unsophisticated methods to gain access. Even though workplace macOS systems have become increasingly popular, organizations often lack adequate macOS endpoint monitoring and management capabilities, compared to their Windows systems — making Macs … [Read more...] about 4 Tips to Protect your macOS Environments
Threat Intelligence to Protect a Remote Workforce
Introduction Adversaries are preying on the fear and disruption caused by the coronavirus pandemic. Their use of COVID-19-related phishing lures with promises of aid or information is now commonplace. In addition, the rapid pivot of organizations to work-from-home has created opportunities for adversaries to probe for security gaps in the newly deployed infrastructure. How can … [Read more...] about Threat Intelligence to Protect a Remote Workforce