Maria Korolov

Contributing Writer

Maria Korolov has been covering emerging technology and emerging markets for the past twenty years. She has reported from Russia, India, and Afghanistan, and recently returned to the United States after running a news bureau in China for five years

What is a botnet? And why they aren't going away anytime soon

What is a botnet? And why they aren't going away anytime soon

Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.

How hackers crack passwords and why you can't stop them

How hackers crack passwords and why you can't stop them

Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

The cyber kill chain breaks down each stage of a malware attack where you can identify and stop it, but be aware of how attack strategies are changing.

Is your data being sold on the dark web?

Is your data being sold on the dark web?

Monitoring the dark web to see if your data is being sold there is risky, but solutions and services are available to help.

How AI can help you stay ahead of cybersecurity threats

How AI can help you stay ahead of cybersecurity threats

Artificial intelligence and machine learning can be force multipliers for under-staffed security teams needing to respond faster and more effectively to cyber threats.

Unlimited DDoS protection the new norm after Cloudflare announcement

Unlimited DDoS protection the new norm after Cloudflare announcement

With Cloudflare ending surge pricing for DDoS protection services, all website owners are protected equally and potential attack damage is limited.

Shadow cloud apps pose unseen risks

Shadow cloud apps pose unseen risks

When individuals and departments bypass IT to acquire cloud services and apps, IT and security teams are blind to the security vulnerabilities and compliance issues they present.

What is a fileless attack? How hackers invade systems without installing software

What is a fileless attack? How hackers invade systems without installing software

Cyber criminals don't need to place malware on your system to get in. Fileless or zero-footprint attacks use legitimate applications or even the operating system.

Is universal end-to-end encrypted email possible (or even desirable)?

Is universal end-to-end encrypted email possible (or even desirable)?

End-to-end email encryption is getting more attention as security and compliance concerns mount, but practical use cases are rapidly being eaten away by other technologies.

What’s new in ransomware?

What’s new in ransomware?

Ransomware attacks--and defenses against them--are evolving fast, but enterprises still struggle to keep up.

Look beyond job boards to fill cybersecurity jobs

Look beyond job boards to fill cybersecurity jobs

The cybersecurity staffing shortage is reaching crisis proportions, and companies are looking beyond the traditional channels of job boards and headhunters to find and hire new talent. Here are some of the unconventional ways...

The OPM data breach 2 years on: What government agencies must do now

The OPM data breach 2 years on: What government agencies must do now

Recent reports show declining grades for government agencies’ efforts to improve cybersecurity. Experts weigh in on what needs to be done.

With new dynamic capabilities, will whitelisting finally catch on?

With new dynamic capabilities, will whitelisting finally catch on?

In this age of destructive and fast-spreading malware, companies are giving whitelisting a second look -- and with cloud-based, peer-to-peer whitelists and reputation scoring, the technology now has a chance to be widely adopted.

Few firms will be ready for new European breach disclosure rules, fines

Few firms will be ready for new European breach disclosure rules, fines

The new European General Data Protection Regulation goes into effect next May, with onerous notification requirements and high penalties, but a year might not be enough for firms to get ready

APT3 hackers linked to Chinese intelligence

APT3 hackers linked to Chinese intelligence

The APT3 hacker group, which has been attacking government and defense industry targets since 2010, has been linked to the Chinese Ministry of State Security, according to a report by Recorded Future.

Be wary of fake WannaCry fixes

Be wary of fake WannaCry fixes

When the WannaCry malware hit, many users were scrambling for fixes -- but some of the proffered solutions were actually just more malware, in disguise

Suffolk County greets hurricane season with updated alerting system

Suffolk County greets hurricane season with updated alerting system

Last September, as the East Coast prepared for Tropical Storm Hermine, the emergency broadcasting system accidentally sent out an evacuation alert for all of Long Island's Suffolk County. The alert was meant just for Fire Island, but...

WannaCry fallout -- the worst is yet to come, experts say

WannaCry fallout -- the worst is yet to come, experts say

The massive scale of the recent WannaCry ransomware attack has exposed some significant weaknesses in global IT systems, and we're likely to see more attacks leveraging similar techniques, and doing even more damage, security experts...

Cybercrooks fight over DDoS attack resources

Cybercrooks fight over DDoS attack resources

As more groups get into the denial-of-service attack business they're starting to get in each other's way, according to a report released this morning. That translates into a smaller average attack size.

Ad network takes steps to reduce fraud

Ad network takes steps to reduce fraud

Online advertisers are losing billions to fraud, but one advertising network has successfully taken steps to clean up its platform. U.S. advertisers spent more $25 billion on programmatic online ads last year, meaning that about $8...

Load More