Heimdal Security
Follow
113 Followers
Follow Heimdal Security on their other social channels!
About Us
Founded:
2011
Company Size:
11-50 employees
Company Type:
Private
Location:
Denmark
Website:
We protect users and companies from cyber-criminal actions, by keeping confidential information and intellectual property safe. We build products focused on proactive cyber security and we dedicate a big part of our efforts to cyber security education for everyone.
Read more
Promoted Content
Expert Roundup: Is Internet Security a Losing Battle?
Follow
10
Security Alert: Spoofing Attacks Targeting the Financial Sector
Security researchers recently analyzed several spam campaigns containing a form of Cobalt malware and discovered that the attackers have been using payloads to execute malicious actions. Online criminals are taking advantage of a vulnerability found in Microsoft Office to spread malware by using a part of the penetration test tool called Cobalt Strike. One of these spear phishing campaigns has been delivered with the following content (sanitized for your own protection). Here’s how a spoof ...
Follow
8
Ransomware Decryption Tools – Unlock Your Data for Free
If your computer gets infected with ransomware, here is how to recover your data: Step 1: Do not pay the ransom because there is no guarantee that the ransomware creators will allow you to recover your data. Step 2: Find any available backups you have. Step 3: If there are no back-ups, you will need to try to decrypt the information locked by ransomware by using the best ransomware decryption tools available.   In this anti-ransomware guide, we included these tools below and a ve ...
Follow
10
How to Enhance your Home Wireless Network Security
What is a home wireless network? In a few simple words, a basic home wireless network means connecting an Internet access point, such as a cable from your Internet Service Provider, to a (wireless) router in order to allow multiple devices to connect to the network very quickly. Source: The Computer Revolution In many cases, once a Wireless router has been installed, we find a place in our home for it and forget about it. As long as all our devices are set up and connected via the Wi-fi ne ...
Follow
12
Here are The Internet Security Blogs You Should Follow Today [Updated 2018]
If you are concerned about your online security (and you should), it’s essential to know which are the best cyber security blogs that could help you stay informed about the most recent trends in the threat landscape. The question then arises: Where can you find the best security blogs to learn and to gain more knowledge in the cyber security field? What security experts to follow so you can stay abreast of changes in this industry and how to better protect your digital assets? How can you ...
Follow
21
Security Alert: Emotet Trojan Returns with New Waves of Spam Campaigns
Guess who decided to show up? No, it’s not Santa Claus :-), it’s the Emotet banking trojan that’s been around for a while and aims to harvest users’ sensitive financial information. Be careful! For the past days, researchers have been analyzing several spam campaigns containing the Emotet banking trojan and found that the malware authors have been using payloads to perform malicious actions. One of these campaigns is delivered with the following content (sanitized fo ...
Follow
26
How to Know if Your Computer Is Malware-Infected [Updated 2018]
Here’s a scenario you may not like, but could happen every day, because it’s always viruses season for computer. You’re working on an important project and suddently start noticing annoying pop-ups displayed on your computer. Also, it takes too long for your files or computer apps to load. You wait and wait until you start asking yourself:  “Does my computer have a virus?” Unfortunately, the answer might be “yes” and your computer could be already ...
Follow
34
Security Alert: New Wave of Malicious Exploit Kits Are Targeting Microsoft Office
Malware authors continue to look for innovative techniques to spread malware and infect users’ computer. This year, exploit kits were one of the most common methods of infection used by cyber criminals to execute malicious code and take control of PCs and systems. During the past week, various exploit kits turned their attention towards Microsoft Office vulnerabilities. For those who are unfamiliar with this terminology, exploit kits are computer programs designed to detect vulne ...
Follow
31
How Flash Vulnerabilities Expose You To Attacks
Adobe Flash is the technology that both made the Internet into something you love and exposed you to getting hacked via Flash vulnerabilities. It will die also in 2020 as its makers will pull support from it. Until then, make sure you know what Adobe Flash is, what Flash vulnerabilities are and how you can avoid getting your data compromised. First of all, here is how to disable Flash Player in your operating system: On Windows, open the Start menu, type “Programs and Features” or & ...
Follow
41
How To Avoid Christmas Scams? Here’s 10+ Valuable Expert Advice
Christmas scams and winter holidays go together like horse and carriage, this I tell you, brother, you can’t have one without the other. Unfortunately, this is the jingle of online scammers, who take advantage of the buzz around holidays to find new and creative ways of relieving you of your money, your data or both. However, you don’t have to be a cybersecurity expert to avoid their grips, as we will outline in this run-down. We also include valuable advice from experts, so you ca ...
Follow
59
How to Easily Remove Malware from Your PC [Updated]
Malware infection. Nobody wants that on their computer and almost everyone might think: “this can happen to me”. Until it does and you don’t know exactly what’s the first thing you should do. Maybe you’ll call the IT guy, ask help from a friend or maybe try to disinfect the computer by yourself. Or maybe you want to address this issue on a security forum where other people encountered the same problems as yours and find a solution. Warning symptoms: You noticed for ...
Follow
We\'re excited to announce that we\'ve joined the No More Ransom project to help Internet users worldwide prevent ransomware attacks and use the free decryption tools available to reclaim their data! More news on this coming soon! Official announcement here: https://www.europol.europa.eu/newsroom/news/no-more-ransom-new-partners-new-decryption-tools-new-languages-to-better-fight-ransomware

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel