Wednesday, October 28, 2020

Cyber criminals using coronavirus in new e-mail scams

OMAHA, Neb. — Cyber criminals are using the coronavirus outbreak as click-bait to steal personal information."We see scammers regularly taking advantage of these sensational...

Graham Cluely – Glock Takes Stock

Highlighting the dangers of the use of third party frameworks. Update now...: A nasty vulnerability has been discovered in the WhatsApp desktop client used by...

Cyber Criminals Using Coronavirus Concern to Assist with Intrusions – Glock Takes Stock

Criminals and politicians hate to waste a good crisis…: As we have seen with other public concerns, cyber criminals and threat actors use these...

Case Study: Jouve Digital Takes on Cybersecurity

Case Study: Jouve Digital Takes on Cybersecurity This is the story of a digital firm that transformed its endpoint defense strategy from reactive to proactive...

Hackers Can Exfiltrate Sensitive Data from Air-Gapped Computers

New cybersecurity research shows that attackers can exfiltrate sensitive information from the air-gapped computers by manipulating the brightness of the screen. The attack was discovered...

#hacking | Malaysia warns of Chinese hacking campaign targeting government projects | National Cyber...

#hacking | Malaysia warns of Chinese hacking campaign targeting government projects | National Cyber Security | Hacker News

#cybersecurity | #hackerspace | IT, Legal, Compliance: We Need to Talk. | National Cyber...

Different priorities and critical communication gaps between IT security teams, compliance professionals, and legal counsel are threatening the regulatory and cybersecurity posture of financial...

How the Internet of Things revolution could intensify hacking attacks

Alexa is listening The potential is endless and already we are seeing IoT proliferate in our homes. My Amazon Echo smart speaker can control the...

Gorgon Group Ensnares Travel, Utility Targets

The expansion of Gorgon’s techniques indicates they aren’t just fishing for victims, but have targets in their sights. Prevailion’s Tailored Intelligence team has...

Who Are the Gamaredon Group and What Do They Want?

In new research published yesterday by SentineLabs, head of research Vitali Kremez reveals how a Russian-backed APT threat actor known as the ‘Gamaredon group’...

Latest article

What You Need for a Successful Store

Retail is a high-risk business; it can also turn out to be a very successful one if you manage to do it...

Key Skills of a Successful Software Product Manager

Becoming a great product manager takes a fair amount of skill. You may be tech-savvy and have brilliant ideas, but it takes...

Half term at home: how to make it fun

Despite having to alter a lot of our plans this year due to Covid-19, it doesn’t mean that we still can’t have...