Two Nigerian citizens are accused of leading a massive fraud scheme that transferred at least $6 million in fraudulently-obtained funds, much of whom was taken from elderly people.
- By Haley Samsel
- Aug 26, 2019
The impact of GDPR, the increasing number of issues with shadow IT and the more advanced solutions for IoT devices are among the most surprising trends.
- By Michael Volkmann
- Aug 23, 2019
A new report predicts a new frontier of cyber attacks for healthcare organizations, including ransomware, international espionage and the hacking of biomedical devices.
- By Haley Samsel
- Aug 22, 2019
Only eight breaches were responsible for the exposure of 3.2 billion records in the first half of the year, according to new research.
- By Haley Samsel
- Aug 22, 2019
The state suspects that the attack, which took place Friday morning and targeted small local governments, was coordinated by “one single threat actor.”
- By Haley Samsel
- Aug 20, 2019
Neglecting basic security practices exposes companies to long-standing security threats.
- By Gilad David Maayan
- Aug 19, 2019
In a search of Paige Thompson’s home, federal agents found servers holding stolen data from other companies and an “arsenal of weapons” belonging to her roommate.
- By Haley Samsel
- Aug 16, 2019
Cameras could be high-priority targets because owners are more likely to pay to get their valuable photos back, researchers said.
- By Haley Samsel
- Aug 13, 2019
Deploying automated decoys can help protect your network and reduce IT costs.
- By Gilad David Maayan
- Aug 12, 2019
Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients.
- By Bud Broomhead
- Aug 08, 2019
The state-sponsored hackers, best known as Fancy Bear, attempted to compromise popular IoT devices like office printers and a VOIP phone.
- By Haley Samsel
- Aug 08, 2019
Connecting devices to a 0G network is a simple fix to seemingly insurmountable challenges.
A Homeland Security agency and the FBI’s El Paso office are cautioning Americans to watch out for malicious "charity" emails and phone call scams.
- By Haley Samsel
- Aug 07, 2019
Experts believe Cisco’s payout to a whistleblower could set a precedent for future lawsuits against vendors who sell products with security vulnerabilities.
- By Haley Samsel
- Aug 06, 2019
At the Cyber:Secured Forum in Dallas, two Pelco employees broke down the "culture shift" from physical to cyber issues in the security industry.
- By Ralph C. Jensen
- Aug 06, 2019
Security Operations shifts security to the left to ensure that security is met at every level, making it both a necessity and a challenge.
- By Gilad David Maayan
- Aug 06, 2019
Why corporations owe it to you and society as a whole to stop data breaches and fraud
- By Simon Marchand
- Aug 05, 2019
Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network
- By Yotam Gutman
- Aug 05, 2019
How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests
- By Evan Francen
- Aug 02, 2019
One topic seemed to dominate this year’s conference: the ongoing challenges of integrating physical security technologies with cybersecurity products.
- By Haley Samsel
- Aug 01, 2019