Cyber Attack Maps...Accurate Or Just Eye Candy?
Here are the top 5 Cyber Attack Maps found in Google. They all seem to show the cyber attacks in a slightly different perspective. This is the Norse attack map as an example:
We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.
Here are the top 5 Cyber Attack Maps found in Google. They all seem to show the cyber attacks in a slightly different perspective. This is the Norse attack map as an example:
What is the true cost of a data breach? After analyzing a health plan breach, research firm Deloitte says the toll of a cyberheist is significantly underestimated. The firm in a report ...
Just when you think they cannot sink any lower, criminal internet scum is now exploiting the tragedy in Orlando. Unfortunately, from this spot I have been warning about these lowlifes ...
Gottfried Leibbrandt, chief executive of the world’s largest interbank funds-transfer system SWIFT, has said repeatedly that the prospect of cybercrime is what keeps him awake at night. ...
We have created a new infographic for your users, as part of your ongoing security awareness training program. It's a few good reminders how to stay safe online, and to keep their ...
In March, we posted a story about a cyberheist where hackers tried to steal a cool 1 Billion dollars from the Bangladesh Central Bank, but a simple typo thwarted most of their attempt. ...
DMA Locker is an excellent example of cybercrime's furious speed of innovation. Version 1 showed up in January 2016, and V2 a month later, but the implementation of the encryption ...
Been suspecting that your users are plugging in any USB stick they find, to see what is on it? Well, you are right, they actually do that. Fresh scientific research by Google, and the ...
NYSE Governance Services and Infosec company Veracode recently published results of a survey over of 276 board members titled "Cybersecurity and Corporate Liability". A massive 60 percent ...
I was very happy to see that NPR has jumped on a story I have been trying to get out for a while. John Ydstie has a new example, where he shows the incredible hassle and disappointment ...
It was another great BlackHat. If you could not make it, here is a roundup of things that I thought were particularly interesting from the perspective we have here at KnowBe4. It's a ...
Unconscionable. I would even say callous and criminal negligence, all on the current administration's watch, of the highly confidential and very private information of the people working ...
Websense released their annual Threat Report, which is interesting if you want to know what’s really happening in the criminal cyber landscape. Here are a few highlights, with a link to ...
Known variously as the “CEO fraud,” or the “business email compromise,” highly sophisticated cyber criminals try to social engineer businesses that work with foreign suppliers. This ...
I have been talking about cyber war / cyber threats from Russia on this blog for about two years now, and it looks like I was on the mark.
IT people responsible for network security talk to us all the time. Almost all of them agree that end-users are their number one headache and managing that problem continues to be a big ...
As promised, here is more data about the Carbanak cyberheist in addition to the original post First of all, a map that shows the IP addresses of the institutions that were hit. Kaspersky ...
I've been looking forward to this one and I was not disappointed. If you like slow-burn high-tech thrillers please go see this movie in the theater because it is worth it. I give it an 8 ...
It's a well-known fact that employees are the weakest link in IT security. There is good news though! New research from our friends at Wombat Security Technologies and the Aberdeen Group ...