article thumbnail

MyBook Users Urged to Unplug Devices from Internet

Krebs on Security

. “The vulnerability report CVE-2018-18472 affects My Book Live devices originally introduced to the market between 2010 and 2012,” reads a reply from Western Digital that Wizcase posted to its blog. “These products have been discontinued since 2014 and are no longer covered under our device software support lifecycle.

Internet 305
article thumbnail

Dridex malware, the banking trojan

CyberSecurity Insiders

Regular backups: Regularly backup important data and keep backups in a secure location. Use a firewall: Use a firewall to block incoming and outgoing connections from known malicious IP addresses.

Banking 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Enterprise VPN Solutions for 2021

eSecurity Planet

Consistently ranked as a top cybersecurity company, Fortinet’s VPN solution is FortiClient, a component of the FortiGate line of firewalls solutions. Since its launch in 2012, Los Angeles, California’s IPVanish has garnered over 1,600 servers in 75 locations and 40,000 IPs. User Reviews: On TrustPilot, IPVanish holds a 4.7/5

VPN 57
article thumbnail

How to Prevent Data Leaks

Spinone

The Hacker had discovered Zuckerberg’s password in a 2012 LinkedIn data breach and he had used the same password across several accounts. This including accounting and team management software and cloud backup services. In June 2016, the Twitter and Pinterest accounts of Facebook CEO, Mark Zuckerberg, were vandalized.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Security services and tools include anti-DDoS , SOCaaS , web application firewalls (WAF), data encryption , and more. Also Read: Top Web Application Firewall (WAF) Vendors. Under security enhancements this could be adding cloud asset inventory, data loss prevention (DLP), firewalls , or VPC service controls.

Firewall 120
article thumbnail

Best MSP/MSSP Vulnerability Scanning Tool Options

eSecurity Planet

Solarwinds Network Configuration Manager Solarwinds’ Network Configuration Manager provides a package of solutions for network compliance, network automation, network configuration backup, and vulnerability assessment.

article thumbnail

Top 6 Rootkit Threats and How to Protect Yourself

eSecurity Planet

In 2012, cybersecurity experts with Kaspersky Labs announced they had discovered another malicious rootkit used in the Middle East, called Flame. deploying firewalls that can analyze network traffic at the application layer. The bot was spread through the ZeroAccess rootkit, an aggressive and difficult-to-detect kernel-mode rootkit.

Firmware 117