Saturday, 29 February 2020

Better Mobile Security with a Mobile Threat Defense Plan

Why your enterprise needs a Mobile Threat Defense (MTD) in place. Today!



from Cyber Security News https://ift.tt/39abWru

Friday, 28 February 2020

New CISO View Report Highlights the Importance of Risk Reduction for Robotic Process Automation

A new report, “The CISO View: Protecting Privileged Access in Robotic Process Automation," shares recommendations from information security executives at Global 1000 enterprises.

from Cyber Security News https://ift.tt/385l4fp

Thursday, 27 February 2020

Cloud Security Risks Will Be a Top Concern for Organizations in 2020

Here, we detail six predictions that will concern most IT and senior management professionals in the coming year.

from Cyber Security News https://ift.tt/2I1rdyN

As Cyber Attacks Become More Prevalent, Here’s Why Your Small Business is at Risk

While many cybersecurity attacks and breaches happen at major enterprise organizations, the reality is cybercriminals don’t discriminate by size and the aftermath of an attack can devastate a small business.

from Cyber Security News https://ift.tt/2vfsfoe

What Lessons Can We Takeaway from Las Vegas’ Recent Thwarted Cyberattack?

Picture this: a news story detailing a cyberattack in which no data was exfiltrated, thousands (or even millions) of credit card details weren’t stole, and no data was breached. While this isn’t the type of headline we often see, it recently became a reality in Las Vegas.

from Cyber Security News https://ift.tt/32BLtAr

JM Family Enterprises Names Victor Campos Chief Information Security Officer

JM Family Enterprises named Victor Campos as chief information security officer (CISO).

from Cyber Security News https://ift.tt/3cdTTmc

Wednesday, 26 February 2020

NIST Releases Roadmap on How to Build Cybersecurity Workforce

The National Institute for Standards and Technology (NIST) released a report outlining best practices in building the cybersecurity workforce through regional partnerships.



from Cyber Security News https://ift.tt/3c8rbTL

Escape Room Challenge: Does Your Team Have What it Takes?

Originally introduced in 2004 as a videogame simulation spinoff, an escape room is a game where teams collaboratively piece together clues, solve puzzles and riddles in order to get out of a room in a given period of time. Time is of the essence, and it is critical that team members work together to win.



from Cyber Security News https://ift.tt/2ThSmml

National Cyber League Spring Season Now Open

Registration is now open for the spring season of the National Cyber League (NCL) competition.



from Cyber Security News https://ift.tt/2T3jyq1

Tuesday, 25 February 2020

Deltek Appoints Caleb Merriman Chief Information Security Officer

Deltek, a provider of software and solutions for project-based businesses, appointed Caleb Merriman as its Vice President and Chief Information Security Officer (CISO).



from Cyber Security News https://ift.tt/32tG6TZ

Internet Security Alliance and National Association of Corporate Directors Release Guide for Cyber-Risk Oversight

The National Association of Corporate Directors (NACD) and the Internet Security Alliance (ISA) released a new, updated Director’s Handbook on Cyber-Risk Oversight, a guidebook to help boards navigate cyber-risk oversight.



from Cyber Security News https://ift.tt/2T0qjcj

HackerOne’s 2020 Hacker Report: Hacking as a Career Soars in Popularity

The concept of hacking as a viable career has become a reality, with 18% of survey respondents describing themselves as full-time hackers, searching for vulnerabilities and making the internet safer for everyone.



from Cyber Security News https://ift.tt/2HViJsU

Monday, 24 February 2020

New Book Available on CISO Strategy, Tactics and Leadership

Michael S. Oberlaender, a CISO and CSO, author and subject matter expert who has worked in global executive level security roles and in IT both in the U.S. and EU for more than 25 years, has released a new book on CISO leadership.



from Cyber Security News https://ift.tt/2w5lxkM

ISACA’s Cybersecurity Study: Struggles with Hiring and Retention Persist, More Diversity Progress Needed

Cybersecurity teams continue to struggle with hiring and retention, and very little improvement has been achieved in these areas since last year, according to new global research from ISACA that identifies current workforce challenges and trends in the cybersecurity field.



from Cyber Security News https://ift.tt/2Plasmk

Cisco 2020 CISO Benchmark Report: Average Company Uses 20 Security Technologies

Cisco's sixth annual CISO Benchmark Report has found that the average company uses more than 20 security technologies, which makes managing a multi-vendor environment challenging. 



from Cyber Security News https://ift.tt/2VthLfJ

Sunday, 23 February 2020

Don’t Just Rely On Data Privacy Laws to Protect Information

 Bottom line: do not rely on data privacy laws to fully protect your information. 

from Cyber Security News https://ift.tt/2HRGphX

Eric Clay Named CSO at CoxHealth

Eric Clay, System Director of Public Safety and Security, has been promoted to Chief Security Officer at CoxHealth.



from Cyber Security News https://ift.tt/2Vg7qU7

Rick Howard joins the CyberWire as CSO and Chief Analyst

Rick Howard will join the CyberWire executive team as CSO and Chief Analyst.



from Cyber Security News https://ift.tt/2SUA37y

Friday, 21 February 2020

University of Alabama to Offer Degree in Cybersecurity

The University of Alabama will offer students a new degree program in the field of cybersecurity beginning this fall.



from Cyber Security News https://ift.tt/32ewFaR

Thursday, 20 February 2020

George Mason University Launches New Cybersecurity Program

George Mason University’s Volgenau School of Engineering announces the creation of the Department of Cyber Security Engineering, the first of its kind in the country.



from Cyber Security News https://ift.tt/2HGu1RJ

Exabeam Unveils Cybersecurity Scholarship Program

Exabeam announced the Exabeam Cybersecurity Scholarship Program, an initiative designed to support the next generation of professionals in pursuing an education and career in the security field.

 



from Cyber Security News https://ift.tt/39QZb4R

900,000 Files Exposed by Plastic Surgery Technology Provider NextMotion

Led by Noam Rotem and Ran Locar, vpnMentor’s research team recently discovered a breached database belonging to plastic surgery technology company NextMotion. 

from Cyber Security News https://ift.tt/2vTuCwA

Personal Data of 10.6 Million MGM Resorts Guests Published on Hacking Forum

The personal details of more than 10.6 million guests who stayed at MGM Resorts hotels were published on a hacking forum. 

from Cyber Security News https://ift.tt/37Lt5WW

FC Barcelona Official Twitter Hacked by OurMine

 FC Barcelona’s official Twitter accounts were hacked by the OurMine crew. 

from Cyber Security News https://ift.tt/2HCOMxN

How Cybercriminals Create, Distribute, Steal Data and Monetize Phishing Emails and Pages

New research finds it has never been easier for aspiring cybercriminals to impersonate companies and lure victims to fake websites. And potential profits are huge with some ‘salaries’ being promised of between $5 and $10k a week.

from Cyber Security News https://ift.tt/38ONRpS

Wednesday, 19 February 2020

Authentication and Passwords Concerns Top New Ponemon Institute Report

IT security practitioners are aware of good habits when it comes to strong authentication and password management, yet often fail to implement them due to poor usability or inconvenience, says the 2020 State of Password and Authentication Security Behaviors Report. 



from Cyber Security News https://ift.tt/2ufbEAn

Cybercriminals Leveraged Either Previously Stolen Credentials or Known Software Vulnerabilities in 2019

The IBM X-Force Threat Intelligence Index 2020 highlights how cybercriminals' techniques have evolved after decades of access to tens of billions of corporate and personal records and hundreds of thousands of software flaws. 

from Cyber Security News https://ift.tt/2wvOTsG

DHS Announces Funding Opportunity for 2020 Preparedness Grants

The U.S. Department of Homeland Security (DHS) Acting Secretary Chad F. Wolf announced funding for eight DHS preparedness grant programs totaling nearly $1.8 billion to improve the nation’s readiness in preventing, protecting against, responding to, recovering from and mitigating terrorist attacks, major disasters and other emergencies. 

from Cyber Security News https://ift.tt/39Omyw1

97% of IT Leaders Say Insider Data Breaches are a Major Concern

A study found that 97 percent of IT leaders say insider breach risk is a significant concern. 

from Cyber Security News https://ift.tt/32aWeJG

Will Wise of Reed Exhibitions Comments on Changes Made to ISC West Show due to Novel Coronavirus

ISC West, the largest security industry trade show in the U.S., will be held next month at the Sands Expo Convention Center in Las Vegas – but with the outbreak of the novel coronavirus in China, a few key changes will be made to this year’s event. 



from Cyber Security News https://ift.tt/2T1h0rh

Gil Vega Named CISO at Veeam Software

Veeam® Software, a provider of backup solutions that deliver Cloud Data Management™, announced that Gil Vega has been appointed Chief Information Security Officer (CISO). 

 



from Cyber Security News https://ift.tt/2HFpkYy

Container and Kubernetes Security Concerns are Inhibiting Business Innovation

Nearly half of all companies surveyed in a report have delayed moving an application into production because of concerns over security of containers or Kubernetes.

from Cyber Security News https://ift.tt/2T1Zm6y

Tuesday, 18 February 2020

The Linux Foundation & Harvard’s Lab for Innovation Science Release Census for Open Source Software Security

The Linux Foundation’s Core Infrastructure Initiative (CII) and the Laboratory for Innovation Science at Harvard (LISH), announced the release of ‘Vulnerabilities in the Core,’ a Preliminary Report and Census II of Open Source Software.`

from Cyber Security News https://ift.tt/2P6ugtk

Greatest Cybersecurity Threats Facing Healthcare Networks in 2020

What threats is the healthcare industry facing today?

from Cyber Security News https://ift.tt/2STp4u5

More than 8.4 million DDoS Attacks Targeted IT Infrastructures, Cloud, Mobile Networks & IoT Devices in 2019

NETSCOUT Threat Intelligence saw 8.4 million Distributed Denial of Service (DDoS) attacks last year alone: 23,000 attacks per day, 16 every minute.



from Cyber Security News https://ift.tt/2uX2qJ9

CISOs: The Cybersecurity Talent Shortage Will Get Worse

62% of CISOs think the global cybersecurity talent shortage will get worse over the next five years, according to Global Snapshot: The CISO in 2020, a report that explores the role and demographics of CISOs.



from Cyber Security News https://ift.tt/2P3Uuga

Monday, 17 February 2020

MIT Researchers: Voatz, Voting App, Can Be Hacked

New research published by the Massachusets Institute of Technology uncovered security vulnerabilities in a mobile voting application that was used during the 2018 midterm elections in West Virginia.

from Cyber Security News https://ift.tt/39B6kGm

Cyber Criminals Using Coronavirus to Carry Out Phishing Attacks

According to the World Health Organization (WHO), cyber criminals are disguising themselves as WHO to steal money or sensitive information. 

from Cyber Security News https://ift.tt/2wjWXMR

Rutter's Suffers POS Malware Attack Exposing Payment Cards

Rutter's, a chain of convenience stores and gas stations with 72 locations in Central Pennsylvania, West Virginia, and Maryland, has provided a notice to its customers of a data breach incident. 

from Cyber Security News https://ift.tt/2P13Adr

U.S. CISA, DHS and FBI Discover North Korean Malware

The Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) identified Trojan malware variants used by the North Korean government. 

from Cyber Security News https://ift.tt/38ATlo7

Friday, 14 February 2020

Advanced System Repair Pro Review 2020

When it comes to solving computer issues there aren’t many options out there for those who aren’t “tech savvy”.  It seems like you’re either stuck with a slow computer or stuck with a huge repair bill from a shop.  Enter Advanced System Repair Pro: this is a software program designed to simplify computer maintenance tasks in a way that is easy enough for the average computer user to understand and use.

Does this software do what it claims it can do?  Is it worth your time and money?  Read our full Advanced System Repair Pro review below to find out the results of our real world testing.

For this review I personally purchased the software to see what the billing and purchase process is like.  I was not given this software to review or asked to write this review – I am doing it voluntarily and with my own money.

Quick Summary TL;DR (Too long; didn’t read):

Advanced System Repair Pro is a winner in terms of an all-in-one system maintenance solution.  This product is very well documented and has undergone a series of third party tests proving performance increases of 40% for boot times, video conferences, browser performance, and more (data supplied by third party Tolly in their extensive report which you can read here).

It is also a member of several third party ethical app groups such as AppEsteem.  Overall it’s a very safe product with a great Better Business Bureau rating and support.  The results you get will vary by computer, but most people looking for a product like this will get a pretty sizable boost to their computer performance.

View Tolly Report

Visit Advaned System Repair Pro Home Page

Download Now

Features

Advanced System Repair Pro is full of features designed to help you get the most performance out of a lagging computer.  Most of these functions will be unknown to the average user, but let’s take a look at everything it claims to do:

  • Privacy Files – Will clean up cookies, passwords, and internet browsing history.
  • Junk Files – One of the more useful features, this will get rid of temporary files that are taking up space on your PC.  Sometimes these files are huge and can be a source of disk space loss.
  • Registry Entry Cleaner – Gets rid of errors or outdated registry entries to streamline the Windows registry.
  • Startup Optimizer – Another very useful feature, this will help you remove excess software from booting on startup.  This can be a huge cause of startup lag.
  • System Optimizations – This will tweak some system settings to get snappier performance out of your PC.  If you have a new computer I wouldn’t use this, but on older computers this may help a lot.
  • Driver Updates – Can be very helpful to mass-update drivers that you may not even know are out of date, such as for system hardware.
  • Malware Threats – Quarantines and removes any malware from your PC.
  • Disk Defrag Utility – Another very helpful tool, this makes it very easy to defragment your hard drive.  Drives that have been in use for a long time will typically get a huge performance boost here.
  • Corrupted Files / Errors – Will get rid of any error files or corrupted files that might be lingering on your machine.

Trust Factors: Certifications And Safety

Advanced System Repair Pro is one of the most certified software tools I’ve reviewed.  They have several trust certifications from third party organizations such as AppEsteem, CleanApps.org, Tolly,  and are “AAA” rated Checkmark Certified by West Coast Labs.

I really like the report from Tolly that showcases a real world result produced by a third party company.  In the report they detail the results of using ASRP on several Windows systems and how much each system improved upon running the software.

It’s notable that the biggest impact on user perception and improvement from these third party tests is in Windows boot speed.

It’s also good to note that TrustPilot has 4,081 user reviews with an average rating of 4.5/5 as of this writing.  Most of the complaints that I see online are about the recurring billing cycle that they use.  However I find these complaints a bit outrageous as it is very clearly stated on their website that they do this.  If you don’t want to keep paying for the product I highly recommend simply sending an email to the billing department right after purchase to ensure that you don’t get rebilled.

Purchase Test

When I purchased the software for myself, the billing process was straightforward.  People should be aware of an upsell for Advanced Privacy Guard that pops up when purchasing the software.  You can decline this.  Again, it’s very clearly marked although if you’re in a rush you might miss it.  Take your time and read the prompts before clicking.  I tested PayPal and Credit Card, and both worked as promised with no hidden fees.  If you use PayPal it’s easier to cancel the recurring billing on your end without the need to contact ASRP.

advanced system repair pro review
My Purchase Receipt

Results And Real World Use

I ran ASRP on my Windows 10 Surface Pro 4 tablet.  This tablet hasn’t been in use that long so it’s admittedly not the best test system, but I also thought it would be interesting to see if it could even improve the performance of a system that is relatively new (around 1 year in use).  The Tolly report mentioned above gives even more detail about the the software performs on older machines.

When I ran the scan there were no false positives, which I thought was nice.  It did not detect any malware, because I don’t have any on this system.  This is important to note because in the past there were some unsavory software tools that would give false reports of malware in order to incite the user to purchase.  With this software you do not need to worry about that at all.

Overall I highly recommend that you inspect all the changes the software wants to make before you fix them all in one go.  For instance, by default it will delete all your browser cookies and saved passwords.  I do not see saving passwords on your system as a security threat as they are usually well encrypted and if you delete these it might cause you a big headache.

Junk Files

The biggest surprise was 5 gig of “junk files” which are essentially just temporary files that are not necessary to keep around.  5 gig is a lot, especially on a hard drive that is only 128 gig total (half of which is typically used up by Windows and essential software anyway!).  In my case it was mostly coming from Driver Packages and Memory Dumps.

I do not recommend deleting driver packages as this can hurt your ability to install plug and play devices in the future.  As it’s only 1.71 gb, I do not need to delete it anyway.

Memory dumps are safe to delete – these are just crash records from when Windows stops running.

Boot Speed Improvements

The startup optimizer can be especially helpful for people who are experiencing slow bootups.  This will help you analyze which software is hogging resources when you turn on your PC.

I don’t have much software installed on this computer, but you can see that Microsoft OneDrive and Adobe Creative Cloud are taking up a lot of my resources on boot.  However, since I need these programs I will leave them alone.  In your case you may have unnecessary software loading on bootup.  Experiment with these to see what you can prune.

Driver Updates

It was also interesting to note how many of my system hardware drivers were out of date.  Updating drivers can have a noticeable impact on system stability and speed, especially for video drivers.  In my case there were 39 drivers that I could update, ranging from my Intel camera to my Microsoft Surface Display.

Malware Test

 

“While some system clean-up utilities may focus on a given area, such as driver updates, system registry, or disk fragmentation, ASR provides a complete system repair capability; including a malware detection and removal engine that has, separately to this test, been awarded Checkmark Certification in its own right.”  — West Coast Labs

 

Interface

There were a few times while testing the software that I couldn’t quite figure out how to turn off a feature.  The software interface could definitely benefit from some streamlining, but overall it’s still pretty good.  On a positive note there is an incredible amount of detail hidden in the interface – you can drill down and see exactly what files and folders the software is cleaning up.  Compared to CCleaner it’s MUCH better in this regard.

Support

When contacting support via email to cancel my recurring subscription, they responded within an hour and a half.  There is no obvious phone number to contact them but this is pretty typical.  Still it will knock some points off in our review as we like software to have a phone number.  However, it’s not a deal breaker as this is not a very expensive product and you can still get in touch fairly quickly via email.

Pros And Cons:

Pros

  • Gives details about exactly what changes and files it’s working on
  • Wide array of features
  • Extensive list of third party certifications
  • Snappy responses to customer service requests
  • Reasonably priced
  • All in one solution for computer tuning

Cons

  • Driver updates weren’t always correct
  • Some system optimization features were for deprecated Windows settings
  • Running all the tools without double checking could lead to unwanted effects (such as deleting saved passwords)

Conclusion – Should You Use This Software?

Advanced System Repair is a great option for those with older machines that want to squeeze a bit more life out them before plunking down money on a new system.

As always, we recommend that users make a restore point or an image backup before proceeding – this should be done whether or not you use any software.  It’s always a good idea to have backups of important files.

Those with Windows installations (this software doesn’t work on Macs) will probably be very happy with the amount of hard disk space they can recover and the improvements they see in boot speed.  Obviously all computers are different and some people will see more improvements than others, and this is noted on the ASRP website as well.

So, if you have had it with your computer’s performance and want to give it a second chance, you might seriously benefit from giving this software a try.

Visit Advaned System Repair Pro Home Page

Download Now

 



from We Hate Malware https://ift.tt/2UUQpi2

FBI’s Internet Crime Complaint Center Received 467,361 Complaints in 2019

Internet-enabled crimes and scams show no signs of letting up, according to data released by the Federal Bureau of Investigation's (FBI) Internet Crime Complaint Center (IC3) in its 2019 Internet Crime Report.

from Cyber Security News https://ift.tt/2uCm2Cx

Thursday, 13 February 2020

Former National Security Agency Director to Lead Cyber Florida at USF

The University of South Florida announced the appointment of J. Michael (Mike) McConnell, retired U.S. Navy vice admiral and former director of the National Security Agency (NSA), as executive director of Cyber Florida.



from Cyber Security News https://ift.tt/2wb9DWh

US Sen. Gillibrand Announces Legislation To Create A Data Protection Agency

The Data Protection Act (DPA) would create a consumer watchdog to give Americans control and protection of their data, promote a competitive digital marketplace, and prepare the U.S. for the digital age. 

from Cyber Security News https://ift.tt/2SF9qT3

More than 15.1 Billion Records Exposed in 2019

The total number of records exposed in 2019 increased by 284 percent compared to 2018. In total, there were over 15.1 billion records exposed. 

from Cyber Security News https://ift.tt/2SAIzY0

Internet Users Overwhelmed by Identity Theft Worries

A new report finds that major data breaches have left a vast majority of consumers worried about the online crimes that lead to identity theft and account takeovers.

from Cyber Security News https://ift.tt/2HlwqRI

97 out of 100 of World's Largest Airports Have Cybersecurity Vulnerabilities

What does research reveal about cybersecurity, compliance and privacy at some of the world's largest airports?

from Cyber Security News https://ift.tt/2SHg9f9

$400 Million for State and Local Governments to Secure Their Networks

Legislation introduced by representatives from the House Committee on Homeland Security would authorize a new grant program at DHS to address cybersecurity vulnerabilities on state and local government networks.



from Cyber Security News https://ift.tt/2SmWeDe

Wednesday, 12 February 2020

Malwarebytes Vs Avast – Which Is Better?

When it comes to computer security these days, it is incredibly important to ensure that you are running reputable software to ensure your data is protected at all times.  I get a lot of people emailing me and asking about Malwarebytes vs Avast, and which one is better for them.

While both programs are really good, they are not completely direct competitors.  Instead, they offer protections against different types of threats.  Let’s take a look at each program and their pros and cons so you can decide for yourself if you want one or the other, or even both.

Malwarebytes

Malwarebytes Corporation is an American-based international computer security software firm that started in 2006.  Their initial offering of Malwarebytes started out as a pure malware removal software tool, but over the years it has evolved into a fully featured security solution for PCs, Macs, and Androids.  As far as complete protection, Malwarebytes Premium is all you really need for your computer, eliminating the need for additional antivirus software.  According to the Malwarebytes website, with the release of Malwarebytes Premium 3, it’s now a complete solution:

“Malwarebytes 3 Premium is our best security offering to date and can serve as the computer’s primary source of software-based protection.”  –Malwarebytes.com

This is especially true with the introduction of the free Windows Defender that is extremely good at antivirus tasks.

We recently wrote up a Malwarebytes Review and we actually gave it a perfect score because we feel it is an excellent piece of software and we use it on our own computers.

Malwarebyte Pros And Cons

  • Active browsing protection – will protect your computer from threats while you browse.  These protections are crowd sourced so they are updated all the time as new threats are discovered.
  • Machine learning technology – thanks to the ability pool resources from users of the software, the program is able to “learn” how to stop zero day threats before they strike.  This means the software will stop a malware or infection because of its behavior – so you can be protected from brand new threats even before they are put on definition lists.
  • Multi Platform – you can use this software on a PC, Mac, or Android device.
  • Extensive support and community knowledgebase – Malwarebytes has an extensive support system as well as extremely active forums where you can post questions and answers.  Probably one of the most active malware communities on the web.
  • Scan Scheduling – schedule scans to run daily or on whatever time frame you want.
  • Clean Interface – an easy to use and read interface is perfect for any level of computer user.
  • Free version isn’t fully stocked – the free version only removes malware that is already causing issues.  We highly recommend Malwarebytes Premium
  • Sometimes overzealous in active protection – we ran into a few times where the active internet protection was blocking competitor antivirus software sites.

 

Get Malwarebytes Premium

Avast Antivirus

Avast is a Czech company that has been around since 1988 and currently has over 1000 employees nationwide.  They are a big player in the computer security field.  They have come out with a suite of different computer protection programs over the years, however the most important of the bunch is Avast Internet Security as well as Premier and Ultimate which are upgrades with more features.

Avast Antivirus got a facelift for 2018 and features a dark skinned theme that is clear and easy to read.  This new update features a multitude of updates and is capable of being a fully featured internet security tool for your PC, Mac, or phone.  Depending on which version you get you will get various tiers of features.  We always recommend getting the best you can afford, however we think that the Internet Security and Premier versions are adequate protections unless you want the VPN and password storage feature that the Ultimate version provides.

As far as how Avast fares, it does extremely well in vigorous malware, virus, and phishing site tests.  PC Mag gave it an extremely good writeup as well as our experience with the software.  If you are comparing the paid versions it seems Avast is neck and neck with Malwarebytes.

Avast Internet Security Pros And Cons

  • Wi-Fi security scan – ensures your wifi connections are up to snuff, and detects any intruders
  • Password storage – stores passwords safely behind encryption so you can use very strong passwords and not have to remember them all yourself.  Great for ensuring you don’t use the same password multiple times.
  • Phishing site detection – sources phishing sites and alerts you before you get tricked
  • Sandbox apps – you can run suspicious apps in a “sandbox” so that your computer is not affected should things go south.
  • Actively block malware and other viruses intelligently – stops these threats before they get onto your machine using threat behavior protocols to stop zero day threats.
  • A bit more resource heavy than Malwarebytes
  • System cleanup in free download requires a purchase
  • More bells and whistles but many are behind a paywall

Get Avast Antivirus

Overall Recommendation – Malwarebytes Vs Avast

This was a tough call.  For now I recommend Malwarebytes Premium as a front line defense.  It’s a bit more lightweight and the protection is just as good, and it’s cheaper.

However, Avast is also very good and they offer a couple more features including a sandbox for suspect software, a password vault, and a few bells and whistles such as game mode to block pop ups and browser cleanup tools.

Depending on your budget and your need for more security and tools, Avast could be right for you as it’s got more for a higher price.  But for just the basics we recommend Malwarebytes Premium.

 

Get Malwarebytes Premium

 

Get Avast Antivirus

 

 

 

 



from We Hate Malware https://ift.tt/2HiCtX5

Charles Burns of Uber to Keynote ISC West

Charles Burns,  Global Head of Security - New Mobility for Uber, will deliver a keynote address at ISC West 2020.



from Cyber Security News https://ift.tt/2w5lOE3

More than 267 Million Facebook User IDs Exposed

An Elasticsearch database containing more than 267 million Facebook user IDs, phone numbers, and names was left exposed on the web for anyone to access without a password or any other authentication.

from Cyber Security News https://ift.tt/37eENsQ

NCSC Unveils the National Counterintelligence Strategy of the U.S. 2020-2022

The National Counterintelligence and Security Center (NCSC) unveiled the National Counterintelligence Strategy of the United States of America 2020-2022, outlining a new approach to counterintelligence to address threats that have evolved significantly since the last strategy in 2016. 

from Cyber Security News https://ift.tt/2SkR9v5

FBI: Kwampirs Malware Targeting Supply Chain Software Providers

The Federal Bureau of Investigation (FBI) has sent a security alert to the U.S. private sector about an ongoing hacking campaign that's targeting supply chain software providers. 

from Cyber Security News https://ift.tt/2SIlyT6

$3.5 Billion Lost in 2019 to Cyberscams, Ransomware, Cybercrime

Internet-enabled crimes and scams show no signs of letting up, according to data released by the FBI’s Internet Crime Complaint Center (IC3) in its 2019 Internet Crime Report.



from Cyber Security News https://ift.tt/31ScWNV

Tuesday, 11 February 2020

Justin Dolly Named CSO at Sauce Labs

Sauce Labs Inc., a provider of continuous testing cloud, announced the appointment of Justin Dolly as chief security officer.



from Cyber Security News https://ift.tt/2UJwRNB

California’s 'Other' Game-Changer: Complying with the New IoT Cybersecurity Law

When California Governor Jerry Brown signed Senate Bill 327 on September 28, California became the first state to enact legislation expressly governing cybersecurity measures that must be employed by manufacturers of Internet-connected “smart” devices, collectively known as the Internet of Things (IoT). The law, to be codified at California Civil Code Sections 1798.91.04–06, became effective on January 1, 2020.

from Cyber Security News https://ift.tt/3bx79Sf

Top Seven Cybersecurity Trends in 2020

What are the top seven cybersecurity trends to be aware of in 2020? 

from Cyber Security News https://ift.tt/2SzK3lv

60% of Enterprises Not Equipped to Respond to Data Breaches

Most organizations (73 percent) surveyed in a research continue to experience unplanned downtime and outages due to mismanaged digital certificates. 

from Cyber Security News https://ift.tt/2SOiYLF

St. Edwards University Receives $1.2 Million Grant to Train STEM Educators

The National Science Foundation’s Robert Noyce Teacher Scholarship Program has awarded St. Edward’s University a more than $1.18 million grant for scholarships aimed at recruiting, preparing and supporting middle and high school math and science teachers.



from Cyber Security News https://ift.tt/2HqHNYN

Note-Based Phishing and Small Bank Impersonation Increased in Q4 2019

The Phishers' Favorites report for Q4 2019 says that PayPal remains the top brand impersonated by cybercriminals for the second quarter in a row, with Facebook taking the #2 spot and Microsoft coming in third.



from Cyber Security News https://ift.tt/3btOneJ

Monday, 10 February 2020

Chinese Military Hackers Charged in Equifax Breach

A federal grand jury in Atlanta, Ga. returned an indictment last week charging four members of the Chinese People’s Liberation Army (PLA) with hacking into the computer systems of the credit reporting agency Equifax and stealing Americans’ personal data and Equifax’s valuable trade secrets.

from Cyber Security News https://ift.tt/3bucHNp

Purdue University Team Creates a Detection System to Alert Organizations to Cyberattacks

A new tool from Purdue University researchers may help stop cyberattacks.

from Cyber Security News https://ift.tt/2UCjzCx

Sunday, 9 February 2020

UW-Whitewater to Offer Online Master of Science in Cybersecurity

The University of Wisconsin-Whitewater will offer one of the first online Master of Science in Cybersecurity programs in the state of Wisconsin to help meet regional demand for protection against cybersecurity attacks.



from Cyber Security News https://ift.tt/2Scy9in

Friday, 7 February 2020

U.S. Department of Defense Publishes New Cybersecurity Standards

The U.S. Department of Defense (DoD) has published a new guide on cybersecurity standards, known as the Cybersecurity Maturity Model Certification (CMMC) version 1.0.

from Cyber Security News https://ift.tt/2uvGvsi

40 Million Americans Affected by Health Data Breaches in 2019

Forty million Americans were affected by health data breaches in 2019 — a 65-percent increase from 14 million in 2018.

from Cyber Security News https://ift.tt/2vdkWgp

Thursday, 6 February 2020

The Top 20 Cybersecurity Conferences to Attend in 2020

Taking place across the U.S. and the world, cybersecurity conferences can offer unique opportunities for cybersecurity professionals, such as hands-on workshops, networking and certifications. They also provide cybersecurity leaders with greater security awareness of threats, tactics and best practices needed to effectively thwart attacks on the systems and assets they protect. Here, Security brings you a list of the top 20 cybersecurity conferences in the U.S. in 2020.



from Cyber Security News https://ift.tt/2S2cMQT

Cybercrime Breaches Cost Corporate Boards Big Time: Have You Done Your Due Diligence?

Back away from the snooze button. This is a $29 million wake-up call you can’t afford to miss. In January 2019, Yahoo’s board agreed to pay the enormous $29 million settlement to its shareholders as the result of cyberattacks that compromised three billion Yahoo user accounts. It was the first time shareholders had successfully held a company responsible for data breaches. And it is a loud warning to corporate boards that they must start paying attention to cyber risks. But are they? Considering that over 7.9 billion records were exposed as of September 2019 — up 112 percent from 2018 — it looks like they may have their fingers in their ears. 



from Cyber Security News https://ift.tt/2twyzqi

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

There seems to be a consensus for advocates of private Internet use that encryption is a good thing, and that encryption of DNS is needed to prevent network operators from gaining visibility into the sites and services their users lookup (and then visit). Two protocols have been created to achieve this encryption: DNS over TLS (DoT) and DNS over HTTPS (DoH). While both offer encryption of DNS data using the same TLS protocol, there are some very important differences:

from Cyber Security News https://ift.tt/2tAPjgh

FBI Warns of Cyber-Based Romance Scams

The Federal Bureau of Investigation (FBI) has issued a warning, asking Americans to be on the lookout for cyber-based romance scams.  

from Cyber Security News https://ift.tt/2v8FQx1

New Survey Reveals CISO Stress and the Toll it Takes

A new report on the working life of the CISO examines the impact of continued stress on the mental health and personal lives of CISOs, and drills down into the causes of stress including poor work life balance and a lack of support from the board. 



from Cyber Security News https://ift.tt/31uuGyM

Wednesday, 5 February 2020

(ISC)² Partners with AISA to Advance Cybersecurity in Australia

(ISC)² has entered into a strategic partnership with the Australian Information Security Association (AISA) to jointly work towards a safer and more secure cyber world.



from Cyber Security News https://ift.tt/2SkF4Fi

FBI: DDoS Attack Potentially Targeted State Voter Registration Site

The U.S. Federal Bureau of Investigation (FBI) warned of a potential Distributed Denial of Service (DDoS) attack that targeted a state-level voter registration and information site in a Private Industry Notification (PIN). 

from Cyber Security News https://ift.tt/37ZzLBy

Toll Group Shuts Down IT Systems Due to Cyberattack

Australian courier company Toll has shut down several of its key systems after receiving a targeted ransomware attack. 

from Cyber Security News https://ift.tt/397Vbg0

Tuesday, 4 February 2020

More Than 9.9 billion Malware Attacks Recorded in 2019

More than 9.9 billion malware attacks were recorded in 2019, a six percent year-over-year decrease.

from Cyber Security News https://ift.tt/398shfS

SIA Names Kathleen Carroll as 2020 Recipient of the SIA Committee Chair of the Year Award

The Security Industry Association (SIA) has selected Kathleen Carroll as the 2020 recipient of the SIA Committee Chair of the Year Award.

from Cyber Security News https://ift.tt/2Uo4PXK

Majority of Election Websites in Battleground States Failing in Cybersecurity

A large majority of election-related websites operated by local governments in battleground states lack a key feature that would help them be more cybersecure. 



from Cyber Security News https://ift.tt/39dcNax

Monday, 3 February 2020

(ISC)² Opens Call for Expert Cybersecurity Speakers for 2020 Security Congress

(ISC)² announced a global call for speakers for its 10th annual Security Congress conference, to be held November 16-18 in Orlando, Fla.



from Cyber Security News https://ift.tt/31ylpG9

Only 17% of Enterprises Globally Considered “Leaders” in Cyber Resilience

Despite higher levels of investment in advanced cybersecurity technologies over the past three years, less than one-fifth of organizations are effectively stopping cyberattacks and finding and fixing breaches fast enough to lower the impact, according to a new report from Accenture. 

from Cyber Security News https://ift.tt/2OnWtvj

Sunday, 2 February 2020

A Framework for Measuring InfoSec as a Business Function

In my December column, I ended with the observation that many CISOs struggle when it comes to first determining and then actually communicating the business value of the security options out there.



from Cyber Security News https://ift.tt/31gxaAC