Omaha cast net that caught cyberthieves
Matthew Hansen, World-Herald Staff Writer just wrote a great article that illustrates what I have been warning about these last years. It starts out like this: "Imagine for a moment that ...
Get the latest news in cybersecurity with in-depth coverage and analysis of current statiistics, developments and how to stay ahead of current threats.
Matthew Hansen, World-Herald Staff Writer just wrote a great article that illustrates what I have been warning about these last years. It starts out like this: "Imagine for a moment that ...
Marc Weber Tobias, a contributor to Forbes Magazine wrote a very interesting article: "One of our security lab team members is an ex-cyberspook who spent his career in the military doing ...
Steve Ragan at the SecurityWeek site, wrote: "Painless PCI assessments are possible if you work for them. For most CISOs, the pain of an audit is part of the job, but it doesnt have to ...
You're in the market to replace your existing Antivirus. One of the vendors on your shortlist has a Special Bonus they are offering. They are going to give you a free high-quality ...
Fingerprint recognition has long been used to protect sensitive data on USB drives - heres another approach. This 8GB USB storage device uses voice recognition software to detect a ...
The upcoming London Olympics is undoubtedly one of the most highly-anticipated sports event of the year. It is also a favorite social engineering ploy among cybercriminals. Just recently, ...
Jaikumar Vijayan over at Computerworld observed correctly: "A recent data breach that exposed the Social Security numbers of more than 280,000 people served as yet another reminder of the ...
Bill Brenner at CSO Magazine is quoting IBM ISS Security Strategist Joshua Corman who has been on a crusade with his 8 Dirty Secrets campaign. Here they are and I'm quoting Dirty Secret ...
Neil Rubenking, who has been writing about antivirus for 30 years now, came up with an excellent article about what to do when your personal email or social media account. This is a ...
IT pros surveyed by Network World and SolarWinds shared a range of tactics for handling the mobile device management challenge. Mobile devices are multiplying and -- sanctioned or ...
[caption id="" align="alignleft" width="260" caption="Vaccine"][/caption] Simon Edwards created a great blog post about this April 12, 2012. He started out with: " Once upon a time, ...
[caption id="" align="alignleft" width="250" caption="MS DOS 6.0"][/caption] Remember MS-DOS Version 6? It was released March 1993. The new 6.0 had a lot of new stuff including a basic ...
Cybercriminals are as organized and industrious as any legitimate business. Case in point: exploit kits, also known as crimepacks, which bad guys can purchase and which make infecting ...
Researchers at NQ Mobile, working alongside researchers at North Carolina State University, have discovered new Android malware that is controlled via SMS that can do a number of things ...
Roger Grimes made this remark on InfoWorld when he commented on the 2012 Verizon Data Breach Investigations Report that was released last week. What he said was: "You should enable event ...
The CSO website reported: "A Mac trojan horse spotted by security analysts since last year has infected more than 600,000 Apple computers, says Dr. Web, a Russian antivirus vendor. Apple ...
This is a good hint for your users from the Microsoft website: "If you plan to share an electronic copy of a Microsoft Word document with clients or colleagues, it is a good idea to ...
[caption id="" align="alignleft" width="290" caption="Global Payment Hacked"][/caption] This is what they said in their press release: Global Payments Inc. (NYSE: GPN), a leader in ...
[caption id="" align="alignleft" width="361" caption="Malware Unique Samples"][/caption] Malware is still exploding. Check out this graph. During the last few years, the security industry ...