Think before you share: Four tips and three tools for spotting a bot on social media

Use advice from DARPA or the CRAAP test to tell the difference between accurate information and suspicious posts. A browser extension from BotSight labels tweets based on an analysis of…

Continue ReadingThink before you share: Four tips and three tools for spotting a bot on social media

Ransomware attacks continue to dominate the threat landscape

Cybercriminals are increasingly exploiting the Cobalt Strike testing toolkit to carry out ransomware campaigns, says Cisco Talos Incident Response. Image: kaptnali, Getty Images/iStockphoto Ransomware attacks often rely on trojans to…

Continue ReadingRansomware attacks continue to dominate the threat landscape

How does open source thrive in a cloud world? “Incredible amounts of trust,” says a Grafana VC

Commentary: The shift in the open source industry from infrastructure like Splunk to Elasticsearch comes down to trust, says Gaurav Gupta, a prominent product executive turned investor. Image: marekuliasz, Getty…

Continue ReadingHow does open source thrive in a cloud world? “Incredible amounts of trust,” says a Grafana VC

Local governments continue to be the biggest target for ransomware attacks

Small municipalities suffer the majority of ransomware, but they aren't the only ones suffering as ransoms rise and payouts become more common. Image: vchal, iStockphoto Barracuda Networks' analysis of ransomware…

Continue ReadingLocal governments continue to be the biggest target for ransomware attacks