Monthly Archives: August 2019
5 Keys to Protecting your Company’s Online Finances
By Dixie Somers Companies with an online presence globally are facing the growing problem of cybercrime. As a company owner, you are not only responsible for detecting online fraud, but […]
Why Bio-metrics Is a Security Essential…And So Is Disabling It ASAP
By Doug Ramos, Security Practice Manager, Groupware Technology Today user identity is the number one concern when securing a corporate network. With malware and hacks being focused on stealing identities, […]
Understanding the Magnitude of Insider Threats: A Global Epidemic
by Jim Henderson, CISSP, CCISO Founder / Chairman Of The National Insider Threat Special Interest Group CEO Insider Threat Defense Group (ITDG), Inc. As the nature of cyber threats has […]
Flaw in New Facebook Design Allowed Removal of Profile Photos
A security vulnerability in the Facebook design (FB5) could have allowed attackers to remove any photo from profiles of the users. The security expert Philippe Harewood is one of the security […]
Not Ocean’s 14
Casinos are also an e-Target By Charles Parker, II Casinos are no different than an accounting firm, hospital, or manufacturer in at least one sense when cybersecurity is the common […]
Taming information overload for effective border controls
By Dr. Enrique Segura, Speaker at INTERPOL World 2017, CEO & President, Securiport In 2016, global outbound travel exceeded $2 trillion, for the first time ever.1 Despite a marked increase […]
The purpose of financial security within a modern society
By Milica D. Djekic What would cyber defense, financial crime, and IT sector get in common? The answer to that question is so simple – the money. All three terms […]
The Future of Cyber security: Putting the capital “C” in Community!
A brief digest from Black Hat 2019 Upon arriving in Las Vegas, I was welcomed by all the familiar sights and sounds one would expect from this playground – vast […]
Hacker publicly releases Jailbreak for iOS version 12.4
Apple accidentally unpatched a vulnerability it had already fixed, making current versions of iOS vulnerable to hackers. A public Jailbreak for iPhones in was released by a hacker, it is […]
The Most Dangerous Computer Viruses That Wreaked Havoc On The World
By Marty Algire and Corey Velan The internet is infested with a magnitude of viruses and other malicious software. Most of these are relatively harmless, or easily defeated by a […]
Smart TVs
Not Completely Safe By Charles Parker, II; Cybersecurity Lab Engineer There are few devices that are as well-known and seen virtually everywhere. These are located throughout the bedrooms, living rooms, […]
A Dive into the Dark World of the Internet
What is the Deep Web & Dark Web? By Sarosh Petkar, BS/MS Student, Computing Security – RIT For the majority of us, the Internet is limited to a mere ten, […]
Stopping Breaches with Purple Teams
by Jennifer Arcuri, CEO, Hacker.House Breaches and Data Theft on an Explosive Rise There have been more than 11 BILLION records stolen by cyber criminals and the numbers are growing […]
How To Prevent Data Leaking On Internet
DATA LEAKING PREVENTION By Israel Gaudette, Owner, Top VPN Canada Data Loss Prevention (DLP) is generally thought as any solution or method that identifies personal information, tracks that data since […]
Bluetana App allows detecting Bluetooth card skimmers in just 3 seconds
Bluetana App allows detecting Bluetooth card skimmers installed at the gas pumps to steal customers’ credit and debit card information in just 3 seconds on average. Bluetooth card skimmers continue […]
When It Comes to Ransomware Pay Now
By Carolyn Crandall, CMO Attivo Networks Ransomware continues to dominate the security news cycle and the minds of most enterprise organizations. Whether this is driven by the recent flood of […]
Issues Associated With Data Backup and Recovery
DATA BACKUP AND RECOVERY By Alice A. Synder, Guest Post, Joint Enterprise Technologies Of all the assets that a business owns, data is the most valuable. But not many businesses […]
700,000 records belonging to Choice Hotels customer leaked online. Crooks demanded ransom
Security experts have discovered that hackers have stolen 700,000 records from Choice Hotels franchise and are demanding payment for their return. Experts at Comparitech with the help of the popular […]
US $12 Billion IoT Security Products Market Growing Steadily, Manufacturing & Healthcare Key Sectors
IoT is making the transition from being a buzzword to becoming an integral component in many verticals. However, in a hyper-connected world, a chink in the armor can lead to […]
Data Breach: Steps Not To Take After It
By Vera Salauyova, PR manager at Falcongaze company There are many recommendations on what to do after a data breach. But what shouldn’t you do? Has your company ever been […]
Cyber security Insurance Policy and Coverage
Reading is Fundamental By Charles Parker, II The business of malware has become operationalized such that a majority of instances are to generate revenue for the attacker(s) via ransomware, harvesting […]
What NIST’s Cybersecurity Framework is and why it matters
Practical advice to help you build a solid InfoSec plan By Michelle Drolet, CEO, Towerwall The risk of your business falling victim to cybercrime has never been higher. Despite a […]
Cyber War Of Nation-States
TARGETING By Geoffrey Nicoletti, Independent Research Analyst Taking down power grids as the first priority in nation-state cyberwar is a myth. Actually, the first priority is taking down the adversary’s […]
Detecting The Covert
Security Through Intelligence By John Williams, Product Manager, Node4 The business has always had to protect its assets. Fifty years ago it would have been tall walls of bricks and […]
Is your desktop telephone secure?
IT security should include Telephony security By Wim Brouwer, Product Manager, RSconnect Protecting sensitive and personal data is a key priority today at many organizations worldwide. This focus is stimulated […]
Convenience Does Not Overrule Common-Sense and Industry Standards
Applications By Charles Parker, II In IT, convenience has taken much more of a focus as of late. Businesses don’t upgrade or update for a number of reasons. The user’s […]
A flaw in Kaspersky Antivirus allowed tracking its users online
A vulnerability in Kaspersky Antivirus had exposed a unique identifier associated with users to every website they have visited in the past 4 years. A vulnerability in the Kaspersky Antivirus […]
The 5 Biggest Corporate Data Security Threats
By Arman Sadeghi, Founder & CEO, All Green Recycling Retail giant Target was robbed of 70 million credit card numbers, and the British Ministry of Justice was fined over $230,000 […]
Data Spill – An Everyday Threat to National Security
By Michael Waksman, CEO, Jetico Inc. Oy Data has a frequent troublesome habit of residing somewhere it shouldn’t. In national security spaces, classified data can end up on unclassified or […]
Security vs. Privacy
By Milica D. Djekic This new time would not deal with the security only, but rather with the privacy as well. As it’s known, security is a process of maintaining […]