RSS Reader for Computer Security Articles

Credit to Author: Scott Gilbertson| Date: Wed, 04 Mar 2020 14:00:00 +0000
A VPN won’t solve all of your privacy problems, but it can help make you a less tempting target for hackers.
Read More
Credit to Author: Oleg Sikorsky| Date: Tue, 17 Mar 2020 15:43:29 +0000
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
Read More![]()
Microsoft recently released a patch for CVE-2020-0796, a critical SMB server vulnerability that affects Windows 10. In this blog post, we attempt to explain the root cause of the CVE-2020-0796 vulnerability and protections customers can apply.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/QDLX9BCZjRY” height=”1″ width=”1″ alt=””/>

Credit to Author: Pavel Shoshin| Date: Mon, 16 Mar 2020 10:00:33 +0000
MonitorMinor is one of the most dangerous spying apps for Android out there. Here’s why.
Read More
Credit to Author: Nikolay Pankov| Date: Fri, 13 Mar 2020 08:00:35 +0000
What to consider when instructing employees to work from home.
Read More![]()
Discover how this new variant of Trickbot works in a victim’s machine, what technologies it uses to perform anti-analysis, and how the payload of TrickBot communicates with its C&C server to download the modules.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/NC7Po6pjVpA” height=”1″ width=”1″ alt=””/>
![]()
Find out more about the tactics, techniques, and procedures (TTPs) of a recently discovered Ryuk ransomware variant to ensure that you can detect and protect against it.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/0XMR6CReb3c” height=”1″ width=”1″ alt=””/>