Our latest blog posts
Safety Detective has the opportunity to interview F-Secure’s Head of Operator Business, Americas, Timo Laaksonen. We asked him what he thinks is the number one threat to cybersecurity today and where he believes antiviruses are headed.
Aviva Zacks of Safety Detective had the privilege of sitting down with Tim Berghoff, G Data’s security evangelist. She found out what he thinks about modern-day smart devices and how much he worries about his mother and other seniors.
Carlos Solari is Vice President of Cybersecurity Services at Comodo. A cybersecurity veteran, Solari’s career has included stints as the CIO for the White House as well as IT positions at the US Army and the FBI. He sat down with Safety Detective’s Aviva Zacks to discuss Comodo’s founding and the modern cybersecurity challenges the company is helping face down.
When it comes to malware, a lot of us have this idea that our phones and tablets are somehow less vulnerable to viruses than our laptops, PCs, and servers. Unfortunately, that’s far from the truth.
Our phones are just as vulnerable to malware and ransomware by malicious programs similar to those that infect computers; mobile phones may even present a larger attack surface due to their abundance.
While most popular operating systems are designed to keep the data on your computer secure, the people who design these systems sometimes make tiny errors that may go completely unnoticed by most users, and may leave you and your PC open to a cyber attacks.
With each of us having so many online accounts, so many pieces of personal data drifting through cyberspace, and so much personal info freely available on social media, it’s never been easier for hackers to impersonate another person.
Identity theft is any instance where a criminal steals and uses some aspect of your personal identity (like your social security number, name, driver’s license number, or other personally identifying info) to commit fraud — usually for financial gain.
In 2017, a man was arrested for stealing $100 million from two tech companies by launching an elaborate cyber attack. He didn’t use ransomware. And he didn’t use some kind of advanced, zero-day malware.
The attacker took an approach that typically gets less attention than the latest and greatest threats — it’s known as spoofing.
There are dozens of different kinds of malware: viruses, Trojans, bots, ransomware, and plenty more. All of them can wreak absolute havoc on your computer if you’re not protected.
One of the most nefarious of the bunch is the class of malware known as computer worms.
Safety Detective’s Aviva Zacks had the chance to interview Webroot’s Senior Director of Product, Andy Mallinger, and took it! Here are his thoughts on phishing and how Webroot is helping protect consumers and small businesses from cyberattacks.
Safety Detective had the pleasure of interviewing Sophos Product Manager Dean Mekkaway, who helped us understand how SophosLabs stays at the forefront of cybersecurity.