Heimdal Security
Follow
99 Followers
Follow Heimdal Security on their other social channels!
About Us
Founded:
2011
Company Size:
11-50 employees
Company Type:
Private
Location:
Denmark
Website:
We protect users and companies from cyber-criminal actions, by keeping confidential information and intellectual property safe. We build products focused on proactive cyber security and we dedicate a big part of our efforts to cyber security education for everyone.
Read more
Promoted Content
Expert Roundup: Is Internet Security a Losing Battle?
Follow
2
Security Alert: Locky Adds the .lukitus Extension, Spreads through Waves of Malspam
After infecting computers with recurring malicious email campaigns sent to random recipients in organizations from all over the world, Locky ransomware strikes again. Locky’s persistence is already famous, as cyber criminals use it frequently to exploit vulnerabilities in outdated systems. The most recent campaign, which started late last night, uses a new extension called .lukitus and has been discovered by Rommel Joven. As expected, Internet users can get their files back, afte ...
Follow
20
These Counter Spoofing Measures Will Keep You Safe
What is spoofing Spoofing is to cybersecurity what camouflage is to bugs and animals. It is a method for malicious hackers to disguise their fraudulent operation and make it seem genuine, and true. For instance, you’ll get a strange email that appears to come from your boss, but the attacker has spoofed the email address, so that it genuinely looks as if your boss is the one who sent it. Caller ID spoofing is another popular scamming method where the attacker disguises his real phone numbe ...
Follow
24
Emotet and Trickbot Banking Trojans Acquire Internet Worm Capabilities
Emotet and TrickBOT are two, relatively recent banking Trojans that have shot up in popularity in the past couple of years. Recently, researchers discovered that two have developed a new kind of malicious feature, directly inspired by the success of the WannaCry and Petya ransomware. The pair now comes with self-replicating capabilities, which mimic the behavior of Internet worms. Quick look into how banking Trojans work Banking Trojans and financial malware in general seek to steal a user& ...
Follow
20
A Closer Look at the Ransomware Attacks: Why They Still Work
Ransomware phenomenon continues to dominate the threat landscape and affect important sectors (hospitals, banks, universities, Government, law firms, mobile users) and various organizations equally worldwide. There are ransomware attacks happening on a daily basis and still have a high rate of success, because they use an advanced technology approach by providing a decryption key after a specific ransom is paid. Cyber criminals also use social engineering techniques to find their next targets, i ...
Follow
24
Session Hijacking Takes Control of Your Accounts. Here’s How
Computer session in normal day-to-day speak is a temporary interaction you have with a website. For example, the time between you first log into your bank account, and then log off after your operation, is a session. During a session hijacking, a malicious hacker places himself in between your computer and the website’s server (Facebook for instance), while you are engaged in an active session. At this point, the malicious hacker actively monitors everything that happens on your account, a ...
Follow
27
Session Hijacking Takes Control of Your Accounts. Here’s How.
Computer session in normal day-to-day speak is a temporary interaction you have with a website. For example, the time between you first log into your bank account, and then log off after your operation, is a session. During a session hijacking, a malicious hacker places himself in between your computer and the website’s server (Facebook for instance), while you are engaged in an active session. At this point, the malicious hacker actively monitors everything that happens on your account, a ...
Follow
54
Biometric Authentication Overview, Advantages & Disadvantages
Biometric seem to be everywhere these days. Consumer preference has turned the technology into a must-have for the modern smartphone or laptop. Fingerprint readers, face recognition or iris scanners are the most immediate examples, but researchers and engineers want to create even more clever solutions such as voice recognition. Some methods are pattern based and learn how you hold your phone or type at a keyboard. Whichever way you look at it, the tech is here to stay. The real question however ...
Follow
28
Top Online Scams Used by Cyber Criminals to Trick You
Cyber criminals affected the online businesses and individuals since the internet networks first appeared and spread all over the world. Internet services and websites make it easy for us to pay bills, shop, make online reservations and even work. And you can do any of these actions from any place in the world. Old boundaries and human limitations were dropped, in order for us to have access to almost any information. Our lives became so much easier. But the same thing is true for CRIME. Our fr ...
Follow
36
14 Warning Signs that Your Computer is Malware-Infected
Malware attacks affect us all. The increasing number of Internet users worldwide creates an equal (or larger) number of opportunities for cyber criminals to take advantage of our systems. As we become more dependent on the online environment, we can clearly see a massive growth in malware and cyber criminal activities all across the globe. Source: McAfee Labs Threats Report, April 2017 According to the McAfee Labs Threats Report of 2017, the number of malware has seen a decline during the past ...
Follow
56
How to DDoS Like an Ethical Hacker
You’ve just arrived home after a long work day, so long in fact that night has already set in. You wander a bit through the darkness, turn on the lights, grab two slices of bread, and put them into that old, creaking toaster. It’s nothing fancy, just a quick and dirty snack until you undress, unwind and cook a proper dish. The moment you push down on the button to toast the bread, you hear a loud pop, and all of the lights suddenly go out. “Damn, the fuse blew up.” Becaus ...
Follow
We\'re excited to announce that we\'ve joined the No More Ransom project to help Internet users worldwide prevent ransomware attacks and use the free decryption tools available to reclaim their data! More news on this coming soon! Official announcement here: https://www.europol.europa.eu/newsroom/news/no-more-ransom-new-partners-new-decryption-tools-new-languages-to-better-fight-ransomware

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel