Tuesday, March 2, 2021

Cyber criminals using coronavirus in new e-mail scams

OMAHA, Neb. — Cyber criminals are using the coronavirus outbreak as click-bait to steal personal information."We see scammers regularly taking advantage of these sensational...

Graham Cluely – Glock Takes Stock

Highlighting the dangers of the use of third party frameworks. Update now...: A nasty vulnerability has been discovered in the WhatsApp desktop client used by...

Cyber Criminals Using Coronavirus Concern to Assist with Intrusions – Glock Takes Stock

Criminals and politicians hate to waste a good crisis…: As we have seen with other public concerns, cyber criminals and threat actors use these...

Case Study: Jouve Digital Takes on Cybersecurity

Case Study: Jouve Digital Takes on Cybersecurity This is the story of a digital firm that transformed its endpoint defense strategy from reactive to proactive...

Hackers Can Exfiltrate Sensitive Data from Air-Gapped Computers

New cybersecurity research shows that attackers can exfiltrate sensitive information from the air-gapped computers by manipulating the brightness of the screen. The attack was discovered...

#hacking | Malaysia warns of Chinese hacking campaign targeting government projects | National Cyber...

#hacking | Malaysia warns of Chinese hacking campaign targeting government projects | National Cyber Security | Hacker News

#cybersecurity | #hackerspace | IT, Legal, Compliance: We Need to Talk. | National Cyber...

Different priorities and critical communication gaps between IT security teams, compliance professionals, and legal counsel are threatening the regulatory and cybersecurity posture of financial...

How the Internet of Things revolution could intensify hacking attacks

Alexa is listening The potential is endless and already we are seeing IoT proliferate in our homes. My Amazon Echo smart speaker can control the...

Gorgon Group Ensnares Travel, Utility Targets

The expansion of Gorgon’s techniques indicates they aren’t just fishing for victims, but have targets in their sights. Prevailion’s Tailored Intelligence team has...

Who Are the Gamaredon Group and What Do They Want?

In new research published yesterday by SentineLabs, head of research Vitali Kremez reveals how a Russian-backed APT threat actor known as the ‘Gamaredon group’...

Latest article

9 Reasons to Invest in Bitcoin Now

Bitcoin has been a bit of a buzzword recently, but it has actually been around since 2009. Over a decade ago when...

1991-2001: Victor Topa – A decade transforming Moldovan aviation 

The decade from 1991 to 2001 was a pivotal one for Moldovan aviation and one in which Mr Victor Topa had a...

Bridge Kenya and the IFC: How For-Profit Schools Designed for Poor Communities Could Help...

Global initiatives targeting improvements in education have historically focused on increasing enrolment rates. There is evidence to suggest that many of these...