Cybercrime | News, how-tos, features, reviews, and videos
Attackers frequently send malicious JavaScript files through bogus emails. It's easy to block these files from reaching a hapless user. Here's how.
Active but unused subdomains in Microsoft Azure give attackers the opportunity to use them for malicious purposes. Here's how to identify and delete vulnerable subdomains before attackers do.
Even large companies like Honda can fall victim to a targeted ransomware attack. Take these steps to harden your Windows network against them.
Microsoft's new Office 365 security defaults and OAuth 2.0 support will help meet new US government recommendations to thwart COVID-related attacks, Make sure they are properly implemented.
You've set up your remote workers during this COVID-19 crisis, but have you made the adjustments to be prepared for a cyber disaster like a ransomware attack?
The rise in phishing attempts requires another look at your Microsoft Office settings to minimize the risk of a user executing a malicious script.
Attackers are more clever about how they hide malicious files. Countering that starts with knowing what services belong on your network.
Use these five techniques on your Windows network to find and limit risk from vulnerabilities that make your organization vulnerable to credential dumping attacks.
Publishing a DMARC record for unused domains is a good idea. Here's how.
Attackers see opportunity in the holidays, but these simple steps and considerations can help block their efforts.