Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Different Types of Ransomware

The different types of ransomware include crypto ransomware, locker ransomware, scareware, leakware and Ransomware-as-a-Service (RaaS). Ransomware is a type of malware, also known as malicious software, that prevents victims from accessing the data stored on their devices until they’ve paid a cybercriminal a certain amount of money, commonly referred to as a ransom.

How To Safely Shop Online

You can shop online securely by shopping on reputable websites, using strong and unique passwords when creating online shopping accounts and watching out for phishing scams. The internet has allowed retailers to sell online and provide a convenient way to shop; however, online shopping also exposes people to potential cyber attacks that can put them at risk of losing their personal and financial information.

The Ultimate Guide to Password Best Practices: Guarding Your Digital Identity

In the wake of escalating cyber-attacks and data breaches, the ubiquitous advice of “don’t share your password” is no longer enough. Passwords remain the primary keys to our most important digital assets, so following password security best practices is more critical than ever. Whether you’re securing email, networks, or individual user accounts, following password best practices can help protect your sensitive information from cyber threats.

Random but Memorable - Episode 11.8: Wrong Movie Airplane Tampering with Ken Munro

We're taking a trip to the movies this episode.🍿 With people speaking with ChatGPT for hours, are we bringing 2013’s sci-fi movie Her closer to reality? And can we really hack airplanes like that iconic scene in Die Hard 2? We unpack all that and more. We're also excited to welcome back friend-of-the-show, Ken Munro, from Pen Test Partners. Ken shares his latest wild discoveries pen-testing airplane security during the pandemic.🔒✈️

Fraud Prevention Tips

To prevent becoming a victim of fraud, you should always keep your data in a secure location, protect your online accounts with strong passwords and Multi-Factor Authentication (MFA), sign up for a dark web monitoring service to receive dark web alerts, learn to spot phishing scams and more. Continue reading to learn more about fraud prevention tips you should be following.

Integrate ServiceNow With Keeper Secrets Manager

ServiceNow users can eliminate secrets sprawl in their organization by dynamically retrieving credentials from their Keeper Vault via a seamless integration with Keeper Secrets Manager. ServiceNow is a cloud-based platform that provides workflow automation, service management and business-process automation solutions to enterprises. ServiceNow is one of the most popular and widely deployed IT Service Management (ITSM) solutions available today.

Security writer Graham Cluley on reformed hackers, deepfake calls, and bad jargon

Technology and cybersecurity changes so fast. But when businesses fail to put basic protections and processes in place, who’s to blame? Graham Cluley – writer, blogger, and host of the Smashing Security podcast – shares his 30-year perspective on this question, and what’s going on in cybersecurity today.