OPM: 'Victim-as-a-Service' Provider
Unconscionable. I would even say callous and criminal negligence, all on the current administration's watch, of the highly confidential and very private information of the people working ...
We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.
Unconscionable. I would even say callous and criminal negligence, all on the current administration's watch, of the highly confidential and very private information of the people working ...
Websense released their annual Threat Report, which is interesting if you want to know what’s really happening in the criminal cyber landscape. Here are a few highlights, with a link to ...
Known variously as the “CEO fraud,” or the “business email compromise,” highly sophisticated cyber criminals try to social engineer businesses that work with foreign suppliers. This ...
I have been talking about cyber war / cyber threats from Russia on this blog for about two years now, and it looks like I was on the mark.
IT people responsible for network security talk to us all the time. Almost all of them agree that end-users are their number one headache and managing that problem continues to be a big ...
As promised, here is more data about the Carbanak cyberheist in addition to the original post First of all, a map that shows the IP addresses of the institutions that were hit. Kaspersky ...
I've been looking forward to this one and I was not disappointed. If you like slow-burn high-tech thrillers please go see this movie in the theater because it is worth it. I give it an 8 ...
It's a well-known fact that employees are the weakest link in IT security. There is good news though! New research from our friends at Wombat Security Technologies and the Aberdeen Group ...
Most small- and medium business owners think that they are not a target for cybercrime. Well, if you think you are safe because you are just a little fish in a big pond, think again. ...
Organizations defend their networks on each of the six levels in the green graph you see. End-user Internet Security Awareness Training resides in the outer layer: ‘Policies, Procedures, ...
It's the holidays and the bad guys are working overtime. There are three scams you want to warn your users about. Remember the Phil Esterhaus character in Hill Street Blues? To begin ...
This is actually quite interesting, hackers that are successful inside Russia, as normally these guys are shut down by the FSB in a heartbeat. It must be that they are outside of the ...
Hackers breached security of a German steel mill's network and caused considerable damage by manipulating the controls of a blast furnace. The attackers gained access to the network ...
Office supply chain Staples Inc. today finally acknowledged that a malware intrusion by hackers this year at some of its stores resulted in a credit card breach. The company now says some ...
The year 2014 has seen a boom on hoax news stories, as these are particularly successful social engineering tactics used by hackers to get people to click on links, and worse, share the ...
Sony has been hacked several times, and should have learned their lesson a while ago, but no. This time it is really bad though. Late yesterday the FBI warned U.S. business that the ...
We have Black Friday and Cyber Monday behind us. After losing ground to online competitors, brick-and-mortar retailers have struck back with incredible online deals. Wal-Mart said ...
Homeland Security Today has a good article which explains that cybersecurity education, including employee training and awareness programs, is vital in deterring cybercrime. The ...