Monthly Archives: August 2019

5 Keys to Protecting your Company’s Online Finances

By Dixie Somers Companies with an online presence globally are facing the growing problem of cybercrime. As a company owner, you are not only responsible for detecting online fraud, but […]

Posted in Cyber Security News | Comments Off on 5 Keys to Protecting your Company’s Online Finances

Why Bio-metrics Is a Security Essential…And So Is Disabling It ASAP

By Doug Ramos, Security Practice Manager, Groupware Technology Today user identity is the number one concern when securing a corporate network. With malware and hacks being focused on stealing identities, […]

Posted in Cyber Security News | Comments Off on Why Bio-metrics Is a Security Essential…And So Is Disabling It ASAP

Understanding the Magnitude of Insider Threats: A Global Epidemic

by Jim Henderson, CISSP, CCISO Founder / Chairman Of The National Insider Threat Special Interest Group CEO Insider Threat Defense Group (ITDG), Inc. As the nature of cyber threats has […]

Posted in Cyber Security News, Featured | Comments Off on Understanding the Magnitude of Insider Threats: A Global Epidemic

Flaw in New Facebook Design Allowed Removal of Profile Photos

A security vulnerability in the Facebook design (FB5) could have allowed attackers to remove any photo from profiles of the users. The security expert Philippe Harewood is one of the security […]

Posted in Cyber Security News | Tagged , , , | Comments Off on Flaw in New Facebook Design Allowed Removal of Profile Photos

Not Ocean’s 14

Casinos are also an e-Target By Charles Parker, II Casinos are no different than an accounting firm, hospital, or manufacturer in at least one sense when cybersecurity is the common […]

Posted in Cyber Security News | Comments Off on Not Ocean’s 14

Taming information overload for effective border controls

By Dr. Enrique Segura, Speaker at INTERPOL World 2017, CEO & President, Securiport In 2016, global outbound travel exceeded $2 trillion, for the first time ever.1 Despite a marked increase […]

Posted in Cyber Security News | Comments Off on Taming information overload for effective border controls

The purpose of financial security within a modern society

By Milica D. Djekic What would cyber defense, financial crime, and IT sector get in common? The answer to that question is so simple – the money. All three terms […]

Posted in Cyber Security News | Comments Off on The purpose of financial security within a modern society

The Future of Cyber security: Putting the capital “C” in Community!

A brief digest from Black Hat 2019 Upon arriving in Las Vegas, I was welcomed by all the familiar sights and sounds one would expect from this playground – vast […]

Posted in Cyber Security News | Comments Off on The Future of Cyber security: Putting the capital “C” in Community!

Hacker publicly releases Jailbreak for iOS version 12.4

Apple accidentally unpatched a vulnerability it had already fixed, making current versions of iOS vulnerable to hackers. A public Jailbreak for iPhones in was released by a hacker, it is […]

Posted in Cyber Security News | Comments Off on Hacker publicly releases Jailbreak for iOS version 12.4

The Most Dangerous Computer Viruses That Wreaked Havoc On The World

By Marty Algire and Corey Velan The internet is infested with a magnitude of viruses and other malicious software. Most of these are relatively harmless, or easily defeated by a […]

Posted in Cyber Security News | Comments Off on The Most Dangerous Computer Viruses That Wreaked Havoc On The World

Smart TVs

Not Completely Safe By Charles Parker, II; Cybersecurity Lab Engineer There are few devices that are as well-known and seen virtually everywhere. These are located throughout the bedrooms, living rooms, […]

Posted in Cyber Security News | Comments Off on Smart TVs

A Dive into the Dark World of the Internet

What is the Deep Web & Dark Web? By Sarosh Petkar, BS/MS Student, Computing Security – RIT For the majority of us, the Internet is limited to a mere ten, […]

Posted in Cyber Security News | Comments Off on A Dive into the Dark World of the Internet

Stopping Breaches with Purple Teams

by Jennifer Arcuri, CEO, Hacker.House Breaches and Data Theft on an Explosive Rise There have been more than 11 BILLION records stolen by cyber criminals and the numbers are growing […]

Posted in Cyber Security News, Featured | Comments Off on Stopping Breaches with Purple Teams

How To Prevent Data Leaking On Internet

DATA LEAKING PREVENTION By Israel Gaudette, Owner, Top VPN Canada Data Loss Prevention (DLP) is generally thought as any solution or method that identifies personal information, tracks that data since […]

Posted in Cyber Security News | Comments Off on How To Prevent Data Leaking On Internet

Bluetana App allows detecting Bluetooth card skimmers in just 3 seconds

Bluetana App allows detecting Bluetooth card skimmers installed at the gas pumps to steal customers’ credit and debit card information in just 3 seconds on average. Bluetooth card skimmers continue […]

Posted in Cyber Security News | Comments Off on Bluetana App allows detecting Bluetooth card skimmers in just 3 seconds

When It Comes to Ransomware Pay Now

By Carolyn Crandall, CMO Attivo Networks Ransomware continues to dominate the security news cycle and the minds of most enterprise organizations. Whether this is driven by the recent flood of […]

Posted in Cyber Security News | Comments Off on When It Comes to Ransomware Pay Now

Issues Associated With Data Backup and Recovery

DATA BACKUP AND RECOVERY By Alice A. Synder, Guest Post, Joint Enterprise Technologies Of all the assets that a business owns, data is the most valuable. But not many businesses […]

Posted in Cyber Security News | Comments Off on Issues Associated With Data Backup and Recovery

700,000 records belonging to Choice Hotels customer leaked online. Crooks demanded ransom

Security experts have discovered that hackers have stolen 700,000 records from Choice Hotels franchise and are demanding payment for their return.  Experts at Comparitech with the help of the popular […]

Posted in Cyber Security News | Comments Off on 700,000 records belonging to Choice Hotels customer leaked online. Crooks demanded ransom

US $12 Billion IoT Security Products Market Growing Steadily, Manufacturing & Healthcare Key Sectors

IoT is making the transition from being a buzzword to becoming an integral component in many verticals. However, in a hyper-connected world, a chink in the armor can lead to […]

Posted in Cyber Security News | Comments Off on US $12 Billion IoT Security Products Market Growing Steadily, Manufacturing & Healthcare Key Sectors

Data Breach: Steps Not To Take After It

By Vera Salauyova, PR manager at Falcongaze company There are many recommendations on what to do after a data breach. But what shouldn’t you do? Has your company ever been […]

Posted in Cyber Security News | Comments Off on Data Breach: Steps Not To Take After It

Cyber security Insurance Policy and Coverage

Reading is Fundamental By Charles Parker, II The business of malware has become operationalized such that a majority of instances are to generate revenue for the attacker(s) via ransomware, harvesting […]

Posted in Cyber Security News | Comments Off on Cyber security Insurance Policy and Coverage

What NIST’s Cybersecurity Framework is and why it matters

Practical advice to help you build a solid InfoSec plan By Michelle Drolet, CEO, Towerwall The risk of your business falling victim to cybercrime has never been higher. Despite a […]

Posted in Cyber Security News | Comments Off on What NIST’s Cybersecurity Framework is and why it matters

Cyber War Of Nation-States

TARGETING By Geoffrey Nicoletti, Independent Research Analyst Taking down power grids as the first priority in nation-state cyberwar is a myth. Actually, the first priority is taking down the adversary’s […]

Posted in Cyber Security News | Comments Off on Cyber War Of Nation-States

Detecting The Covert

Security Through Intelligence By John Williams, Product Manager, Node4 The business has always had to protect its assets. Fifty years ago it would have been tall walls of bricks and […]

Posted in Cyber Security News | Comments Off on Detecting The Covert

Is your desktop telephone secure?

IT security should include Telephony security By Wim Brouwer, Product Manager, RSconnect Protecting sensitive and personal data is a key priority today at many organizations worldwide. This focus is stimulated […]

Posted in Cyber Security News | Comments Off on Is your desktop telephone secure?

Convenience Does Not Overrule Common-Sense and Industry Standards

Applications By Charles Parker, II In IT, convenience has taken much more of a focus as of late. Businesses don’t upgrade or update for a number of reasons. The user’s […]

Posted in Cyber Security News | Comments Off on Convenience Does Not Overrule Common-Sense and Industry Standards

A flaw in Kaspersky Antivirus allowed tracking its users online

A vulnerability in Kaspersky Antivirus had exposed a unique identifier associated with users to every website they have visited in the past 4 years. A vulnerability in the Kaspersky Antivirus […]

Posted in Cyber Security News | Comments Off on A flaw in Kaspersky Antivirus allowed tracking its users online

The 5 Biggest Corporate Data Security Threats

By Arman Sadeghi, Founder & CEO, All Green Recycling Retail giant Target was robbed of 70 million credit card numbers, and the British Ministry of Justice was fined over $230,000 […]

Posted in Cyber Security News | Comments Off on The 5 Biggest Corporate Data Security Threats

Data Spill – An Everyday Threat to National Security

By Michael Waksman, CEO, Jetico Inc. Oy Data has a frequent troublesome habit of residing somewhere it shouldn’t. In national security spaces, classified data can end up on unclassified or […]

Posted in Cyber Security News | Comments Off on Data Spill – An Everyday Threat to National Security

Security vs. Privacy

By Milica D. Djekic This new time would not deal with the security only, but rather with the privacy as well. As it’s known, security is a process of maintaining […]

Posted in Cyber Security News | Comments Off on Security vs. Privacy

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X