Today, we’re excited to introduce reCAPTCHA v3, our newest API that helps you detect abusive traffic on your website without user interaction. Instead of showing a CAPTCHA challenge, reCAPTCHA v3 returns a score so you can choose the most appropriate action for your website. Continue reading
Archive for October, 2018
DevOps is a growing and useful paradigm in web application development, but it fails to address the security issues plaguing today’s marketplace. The principles of DevOps, however, can easily integrate more effective security, paving the way for DevOps to become DevSecOps. Continue reading
Abandoned, shadow and legacy applications undermine cybersecurity and compliance of the largest global companies despite growing security spending. Continue reading
This is the first in a series of blogs featuring a Palo Alto Networks CYBERFORCE Engineer and the business challenges they tackle. CYBERFORCE recognizes the best-of-the-best from the NextWave Partner Community; proven partner engineers who put the customer first, are trusted for their security expertise, and focus on preventing successful cyberattacks. Continue reading
The Asus ROG Strix Flare is a new mechanical keyboard from Asus’ ROG line up. Before I start, I’d just like to say that this is a premium board that demands a premium price, therefore I’ll be judging this keyboard accordingly. Continue reading
The wait is over. For victims of GandCrab versions 1, 4 or 5, there is a new decryption tool available from Bitdefender Labs to help you get your life and your data back – for free. Download link and updated information below. Continue reading
Police in Australia have arrested a 23-year-old woman in Melbourne, Australia, in connection with an email hack that resulted in a huge amount of virtual currency being stolen. The story starts in January 2018, when a 56-year-old man discovered that he had been locked out of his email account. His password had been changed and his account’s security settings updated to enable a mystery cellphone to be used as a means of secondary authentication. Continue reading
It’s 2018, and you can still end up with your computer compromised by searching for the world’s most popular browser. That fact was brought home once again by Twitter user Gabriel Landau who, immediately upon firing up his brand new Windows 10 laptop and trying to download Google Chrome, was directed instead by Bing (the default search engine used by Windows 10’s default Microsoft Edge browser) to a bogus website. Continue reading
Artificial intelligence and machine learning are extensively used in cyber defense, but what happens if they backfire and hackers use these technologies for crime? As they concentrate on the capabilities and benefits it can bring to everyday lives, companies have not really focused on how cybercriminals can use AI to create even more advanced and sophisticated threats. Continue reading