Sunday, September 27, 2020

Cyber criminals using coronavirus in new e-mail scams

OMAHA, Neb. — Cyber criminals are using the coronavirus outbreak as click-bait to steal personal information."We see scammers regularly taking advantage of these sensational...

Graham Cluely – Glock Takes Stock

Highlighting the dangers of the use of third party frameworks. Update now...: A nasty vulnerability has been discovered in the WhatsApp desktop client used by...

Cyber Criminals Using Coronavirus Concern to Assist with Intrusions – Glock Takes Stock

Criminals and politicians hate to waste a good crisis…: As we have seen with other public concerns, cyber criminals and threat actors use these...

Case Study: Jouve Digital Takes on Cybersecurity

Case Study: Jouve Digital Takes on Cybersecurity This is the story of a digital firm that transformed its endpoint defense strategy from reactive to proactive...

Hackers Can Exfiltrate Sensitive Data from Air-Gapped Computers

New cybersecurity research shows that attackers can exfiltrate sensitive information from the air-gapped computers by manipulating the brightness of the screen. The attack was discovered...

#hacking | Malaysia warns of Chinese hacking campaign targeting government projects | National Cyber...

#hacking | Malaysia warns of Chinese hacking campaign targeting government projects | National Cyber Security | Hacker News

#cybersecurity | #hackerspace | IT, Legal, Compliance: We Need to Talk. | National Cyber...

Different priorities and critical communication gaps between IT security teams, compliance professionals, and legal counsel are threatening the regulatory and cybersecurity posture of financial...

How the Internet of Things revolution could intensify hacking attacks

Alexa is listening The potential is endless and already we are seeing IoT proliferate in our homes. My Amazon Echo smart speaker can control the...

Gorgon Group Ensnares Travel, Utility Targets

The expansion of Gorgon’s techniques indicates they aren’t just fishing for victims, but have targets in their sights. Prevailion’s Tailored Intelligence team has...

Who Are the Gamaredon Group and What Do They Want?

In new research published yesterday by SentineLabs, head of research Vitali Kremez reveals how a Russian-backed APT threat actor known as the ‘Gamaredon group’...

Stay connected

25,000FansLike
5,444FollowersFollow
1,020SubscribersSubscribe

Latest article

How to Successfully Manage a Digital Marketing Campaign from Start to Finish

  The world is digital. Even physical campaigns are made as an afterthought to the main digital campaign that...

The Most Important Cybersecurity Tips for Your Website

Cybersecurity is one of the most important things that any webmaster needs to think about. The reasons are clear; not thinking about...

How to Use Tech to Improve Your Relationship with Your Suppliers

Finding the right supplier is like finding your best friend in business. The right supplier does more than just ship you the...