VIDEO The Top 5 Online Security Traps And How To Avoid Them
GFI is one of the few antivirus vendors that understands the importance of prevention and end-user training. They produced this useful video that in two minutes illustrates the top 5 ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
GFI is one of the few antivirus vendors that understands the importance of prevention and end-user training. They produced this useful video that in two minutes illustrates the top 5 ...
Christopher Mims over at Technology Review was the first one to report on this. A large Gmail security hole could lead to mass harvesting of accounts, as hackers can automate this social ...
Softpedia reported: "A shady-looking email, apparently originating from Facebook, has been seen in inboxes, informing users that the social media network has received an account ...
I was interviewed by Jeremy Quittner yesterday. Here is how he started his article in American Banker today: "It took Stu Sjouwerman, the founder and chief executive of security firm ...
Monday morning, I found a tweet by @INFOSECSchool with the above title. I admit, it's a catchy phrase and sure enough, IF you allow easy passwords, it's an invitation to get hacked. This ...
[caption id="" align="alignleft" width="260" caption="Fake Amex ID Verification"][/caption] OK, here is another one to warn everyone about, especially the employees that have a ...
[caption id="" align="alignleft" width="260" caption="Spot the security "no-no""][/caption] Wow, talk about a TV interview that contains a massive vulnerability. We think this is a press ...
Rod Rasmussen over at SecurityWeek has a really interesting article about a Russian cyber gang driving a massive wave of fraud: "Tucked away in a small town outside Moscow, Russia one of ...
A Homeland Security Department cyber response team focusing on industrial control systems has issued a warning to the natural gas pipeline industry of targeted cyberattacks that have ...
Linda Musthaler, at NetworkWorld just wrote an excellent article about training workers to be cyber safe. One paragraph was especially noteworthy: “In 2012 we’re already seeing a sharp ...
This is a discussion on Reddit, where a (presumably Polish) malware coder and botnet operator very candidly answers questions from people. This is a fascinating but rather technical read, ...
The Internet Crime Complaint Center had this 'Intelligence Note': "Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers ...
Fresh from Yahoo News by Steve Weizman: "Interpol president Khoo Boon Hui said on Tuesday that organised international gangs are behind most internet scams and that cyber crime's ...
The personal cloud is poised to eclipse the PC as the hub of consumers' digital lives by 2014 as rapid growth in the use of apps and services introduces a new paradigm for how people ...
WIRED Mag has a great article by Kim Zetter. It boils down to the fact that high-level hackers are able to get and stay in your network. And even if you are able to kick them out, they ...
I just got a 'perk' over at the Klout site, which gives you a score how you do in Social Media. The perk was 50 business cards, each with a different backside if you want to. The company ...
Tracy Kitten over at BankInfoSecurity spotted something interesting in Symantec's recent Internet Security Threat Report. This is the upshot: "Which Internet security threats pose the ...
Kelly Jackson Higgins over at Dark Reading had a very interesting article: "Cyberattacks don't always employ exploited vulnerabilities: Sometimes they prey on weaknesses in the business ...
We have seen crooked Walmart gift card offers before, but now and then I run across one that's craftier than earlier versions. And as usual, you do not get the gift card, but a high dose ...