Category: News
The Financial Services Information Sharing and Analysis Center (FS-ISAC), an industry forum for sharing data about critical cybersecurity threats facing the banking and finance industries, said today that a successful phishing attack on one of its employees was used to …
Was Facebook trolling users when it offered a survey about pedophiles to a “small group” — meaning thousands of people? Or does the social network believe it is above the law? The survey was short, but the questions were strange, …
Last year we published a story revealing the rise of miners across the globe. At the time we had discovered botnets earning millions of USD. We knew this was just the beginning of the story, which turned out to develop …
Credit score giant Equifax is back in Capitol Hill’s crosshairs after announcing it had identified an additional 2.4 million U.S. consumers whose personal information was affected by last year’s data breach, bringing the total number of victims to 147.9 million. …
False flags, for the modern nation-state hacker, are quickly becoming as standard a part of the toolkit as phishing links and infected Microsoft Office attachments. Why simply hide your identity when you can simply paste a new one over it, …
Vulnerable internet-connected devices from security cameras to smartphones can be hijacked by hackers and turned into tools to mine cryptocurrencies, a cybersecurity company has demonstrated. Avast, which is based in the Czech Republic, ran a demonstration on Wednesday at Mobile …
Cryptocurrencies and blockchain were meant to be great equalizers. Instead, women are finding that the gold rush is already stacked against them. When a cryptocurrency start-up that promised to revolutionize the fruit and vegetable industry shut down last month, it …
Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or profitable, many others of the same type will inevitably follow. The best defenses need to mirror …
Last week’s SEC guidance on security risk disclosure is the next event in a sequence of global trends recognizing the urgency of IT security in the digital economy. As companies around the world come to grips with data breach notification …
v. Swiping computer processing power through a web browser to illicitly mint cryptocurrency. People who streamed the TV drama Billions last fall may have been hit by some real-life financial chicanery. While they watched, a rogue script on the …
As one who attends many industry conferences, it’s almost a guarantee that you will hear the cliché question “What issue keeps you up at night?” posed to enterprise security executives on stage. While the question may be monotonous, the responses …
I recently ran across an article titled “Cisco Report Finds Organizations Relying on Automated Cyber-Security.” It got me thinking about what we are doing these days and must continue to do in this area. The report is Cisco’s 2018 annual …
There’s no question that virtual currencies are destined to become mainstream, given the market’s already astounding exponential growth; in 2017 alone, the value of cryptocurrencies increased more than 2,700 percent. And while mass adoption of virtual currencies may be in …
This is not “yet another” article spooking you with the eye popping “Fines of up to 4% of revenue or 20 million Euros for failure to meet GDPR regulations.” There are plenty of webinars, self-styled GDPR analysts and experts who …
Russian military hackers hacked hundreds of computers at the 2018 Winter Olympic Games, but tried to make it look like the hacks were conducted by North Korea, according to a report by The Washington Post. U.S. officials clinging to anonymity …
After researching digital currencies for work last year, personal finance writer J.R. Duren hopped on his own crypto-rollercoaster. Duren bought $5 worth of litecoin in November, and eventually purchased $400 more, mostly with his credit card. In just a few …
Considering the upcoming GDPR, increasing migration to the cloud and BYO-everything, data loss prevention (DLP) technologies are making a resurgence. However, today’s DLP technologies have significantly evolved from what they once were. While traditional DLP technologies were effective at keeping …
Hacking is a booming business. Business has been good for several years now. Data breaches are at all-time highs. Cyber-attacks are skyrocketing, and ransomware is a growing fad. And the best news of all is that the same old tricks …
A Japanese cryptocurrency exchange undergoing checks by regulators has said a system failure let investors briefly trade a digital currency for zero yen, highlighting security concerns about such assets after last month’s cyber heist at Coincheck Inc. Zaif, an exchange …
A better deal for South Korea’s cryptocurrency industry might be in the offing as the market regulator changes tack from its tough stance on the virtual coin trade, promising instead to help promote blockchain technology. The regulator said on Tuesday …