January 27, 2020 | David Smith

How Smart Cards Work

An independent guest blogger wrote this blog. In this modern age, there’s been a significant improvement in the digitization of traditional payment methods. We live in a technologically advanced era, and as such, advancements in payment infrastructures makes life easier, transactions faster, swifter, and smoother. Almost all countries in the world are adopting the cashless economy policy. Smart…

January 23, 2020 | Devin Morrissey

Healthcare security: How can blockchain help?

This is part 2 of a blog on healthcare security. For more info, check out part 1. An independent guest blogger wrote this blog. When it comes to data security, there is no more important place than the healthcare industry. When people go to the doctor, they provide all of their most sensitive information, from their health issues to their phone…

Get the latest security news in your inbox.

Subscribe via Email

January 22, 2020 | Bob Covello

It is getting harder for us to prove who we are

I had an interesting experience the other day.  I had to renew my driver’s license.  In previous renewal cycles, this was no big deal.  One could just visit the local Department of Motor Vehicles (with a bagged lunch since it was usually a multi-hour wait), read an eye chart, take a horribly unflattering photo, and…

January 21, 2020 | Joe Gray

FUD-free analysis: Natural language processing (NLP)

If you follow me on Medium or Twitter, you may already be aware. Still, if you don’t (I assure you that you’re missing out), I have been researching several technologies in preparation for an OPSEC/Anti-OSINT tool that I am crafting. I am using this tool as a means to push myself harder…

January 17, 2020 | Dean Chester

Journey to security: Data safety for travelers

Image source: Pixabay Note:This blog was written by an independent guest blogger. In today’s world, we enjoy incredible mobility that our ancestors could only dream of. In a matter of hours or, at most, days, we can go from one continent to another. At the same time, our lives depend on the security of all sorts of…

January 15, 2020 | Fernando Martinez

Alien Labs 2019 Analysis of Threat Groups Molerats and APT-C-37

In 2019, several industry analyst reports confused the threat groups Molerats and APT-C-37 due to their similarity, and this has led to some confusion and inaccuracy of attribution. For example, both groups target the Middle East and North Africa region (with a special emphasis on Palestine territories). And, they both approach victims through the use of phishing emails that contain decoy…

January 14, 2020 | Sara Gepp

Running an Eco-friendly IT business

  (banner image green leaf key Adobe Stock ) As someone in the technology field I follow the steady stream of new and exciting products and gadgets that come out at least twice a year. I am constantly upgrading my tech and my IT work tools in keeping with what is new. I need to have personal experience with the devices…

January 13, 2020 | Jason Nelson

How to identify phishing emails and what to do

Note:This blog was written by an independent guest blogger. Phishing scams remain one of the most widespread cybercrimes. A phishing scam can be as simple as getting someone to click on a link, attachment, or a picture of cute kittens. I recently received a spam email with the message: “Old friends post embarrassing pictures of Jason Nelson online;…

January 10, 2020 | Kate Brew

Top 10 AT&T Cybersecurity blogs of 2019

Happy New Year! What a year 2019 was in cybersecurity. It was a great year for informative and interesting blogs. Here were the top performing AT&T Cybersecurity blogs written in 2019:  1. The Great Cannon has been deployed again by Chris Doman took the top spot! 2. AT&T Cybersecurity is Born by our CEO, Barmak Meftah…

January 9, 2020 | Fernando Dominguez

AT&T Alien Labs analysis of an active cryptomining worm

This blog post provides an overview of the AT&T Alien Labs™ technical analysis of the common malicious implants used by threat actors targeting vulnerable Exim, Confluence, and WebLogic servers. Upon exploitation, malicious implants are deployed on the compromised machine. While most of the attacks described below are historical, we at Alien Labs are continuing to see new…

January 8, 2020 | Karoline Gore

Security and digital payments – growth finally meeting demand

Note:This blog was written by an independent guest blogger. Digital payments are the future of commerce, but security concerns have created a major barrier to their popularity. A study of businesses conducted by the influential PCI Security Standards Council found that 67% of respondents cited a lack of visible security options as a reason for not adopting a…

January 7, 2020 | Devin Morrissey

Healthcare cybersecurity for 2020 and beyond

An independent guest blogger wrote this blog. block These days, effective cybersecurity in healthcare is as critical as ever. Last year, more than 32 million patients had their personal and medical information stolen in data breaches across the United States. While moves are being made, the fact remains that healthcare providers still have many holes to plug when it comes to…

Watch a Demo ›
Get Price Free Trial