No monkeys for CozyDuke
Yet another APT of the ‘Dukes family’ is hitting high-profile targets, including the US government office. This time it’s CozyDuke, also known as CozyBear, CozyCar or “Office Monkeys” in honor of
Yet another APT of the ‘Dukes family’ is hitting high-profile targets, including the US government office. This time it’s CozyDuke, also known as CozyBear, CozyCar or “Office Monkeys” in honor of
SAN FRANCISCO — It’s an utterly played out platitude that the security industry is largely failing at its mission to protect computers and networks and all the nearly infinite data
Recently the United States Government Accountability Office published a report warning the Federal Aviation Administration that aviation faces cybersecurity challenges in “at least three areas”, including the protection of aircraft avionics used to operate and guide aircrafts.
According to a survey conducted by Kaspersky Lab and B2B International over a 12-month period, 22% of parents polled indicated that their children were affected by cyber incidents. Examples of these incidents included
Hello there! Usually, I write about topics concerning technical support or problem-solving, but not this time – though it will be relevant to the cybersecurity world. Today’s post concerns phone fraud.
World nations are building fleets of unmanned robotic boats to perform missions above, on and under the water. Though there are only a few hundred unmanned maritime vessels in operation worldwide, drones
Flightradar24 allows you to track what’s happening to any particular aircraft taking a family member or friend to their destination. Let’s find out how this service works.
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.
Many people still think that malware is a software that completely disrupts normal functioning of PCs. If your computer is working tip-top, it means it‘s not infected, right? Wrong. Malware creators are
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
Threatpost reporters Chris Brook and Brian Donohue discuss recent security headlines, including a contentious new Executive Order, the Dyre banking scheme, Github’s distributed denial of service troubles, the sale of
The word “IoT” (Internet of Things) has been a buzz word for several years now. It has become the era when more home electronics and cars are connected to the
Threats are everywhere on the Internet and they pose a serious danger to younger users. Moreover, use of mobile devices leave children even more vulnerable because they are free to surf
Photographer Curtis Wallen’s latest exhibit, “Proposition For An On Demand Clandestine Communication Network,” opened in a Brooklyn art-house Sunday. The work explored what it would take for a normal person to
There are many cool and funny projects in the world that deal with big data and we’ve gathered the Top 10 list of the most interesting ones. See for yourself!