Business leaders claim that cybersecurity skills are a top priority, but their actions often suggest otherwise. If there’s one profession that continues to dominate demand in tech hiring, it’s cybersecurity. Demand for cybersecurity staff has skyrocketed since ‘remote work’ became more common and businesses doubled down on their digital assets, to insure them against future uncertainty. […]
Cyber attacks targeting vulnerabilities in internet browsers are on the rise, with Google Chrome being a main target for hackers. According to analysis by cybersecurity researchers at WatchGuard, the second quarter of this year saw an overall 23% increase in malware attacks against browsers, Chrome, Firefox, and Internet Explorer, compared to the previous quarter. Much […]
Microsoft rolls out a new security feature that should significantly slow down password attacks against Windows devices.The latest preview of Windows 11 ships with the SMB server authentication rate limiter on by default. This makes Windows 11″a very unattractive target” for hackers trying to steal credentials, since it’s much more time-consuming for them to target […]
Those of you who use Microsoft Edge want to make sure that your security is as tight as possible.Edge offers several options to help protect you from malicious websites and other online hazards. A SmartScreen option will protect you from malicious websites and files. An option for potentially unwanted apps blocks downloads of suspicious or […]
Targets of ransomware rarely publicly acknowledge attacks. More openness would help everyone. Ransomware is one of the most significant cybersecurity issues we face, as cyber criminals hack into businesses, schools, hospitals, critical infrastructure and more, in order to encrypt files and demand a ransom payment for the decryption key. Despite warnings not to, many victims pay […]
Google Chrome users on Windows, Mac, and Linux need to install the latest update to the browser to protect themselves from a serious security vulnerability that hackers are actively exploiting. “Google is aware of reports that an exploit for CVE-2022-3075 exists in the wild,” the company said in a September 2nd blog post. An anonymous tipster reported […]
A vulnerability in the TikTok app for Android could have let attackers take over any account that clicked on a malicious link, potentially affecting hundreds of millions of users of the platform. Details of the one-click exploit were revealed in a blog post from researchers on Microsoft’s 365 Defender Research Team. The vulnerability was disclosed to TikTok […]
Cybersecurity focuses on protecting electronic information on websites, networks, or devices from hackers. Through advanced technology and sophisticated processes, cybersecurity professionals, like ourselves at bva, help keep data safe and accessible. Individuals and businesses alike face cybersecurity threats. In addition, businesses need protection from unauthorized data access, both from inside and outside the organization. Strong […]
A security researcher has found a way that an attacker could leverage the macOS version of Zoom to gain access over the entire operating system. Details of the exploit were released in a presentation given by Mac security specialist Patrick Wardle at the Def Con hacking conference. Some of the bugs have already been fixed […]