Former New York Observer Editor Re-charged Over Cyber-stalking

Former New York Observer Editor Re-charged Over Cyber-stalking

A former editor of the New York Observer who was pardoned in January for alleged cyber-stalking has been re-charged for a similar, related offense.  New Jersey resident Kenneth Kurson, also known as Jayden Wagner and Eddie Train, was charged on October 23, 2020, with cyber-stalking three individuals and harassing two additional people. His alleged victims include his former wife, her friend, and a doctor employed by Mount Sinai Hospital.  Kurson’s alleged crimes dated back to November and…

Read More

Reflecting on Marc Andreessen’s ‘Software is Eating the World’

Reflecting on Marc Andreessen’s ‘Software is Eating the World’

Ten years ago today, August 20, 2011, Marc Andreessen, the co-founder of Netscape and an influential investor, published a pivotal story in the Wall Street Journal: Why Software is Eating the World (also reprinted on his venture capital firm’s Web site). It was a stake in the ground and a rallying cry. I’ve never forgotten that story and the impact it had on me. When Marc’s story appeared, I was working at Microsoft, in developer…

Read More

DemonWare Solicits Staff to Deploy Ransomware

DemonWare Solicits Staff to Deploy Ransomware

A cyber-criminal group has been emailing employees and asking them to help attack their own companies with malware.  The insider threat solicitation scheme was discovered by researchers at Abnormal Security. The author of the emails is someone who claims to have links with the DemonWare ransomware group, also known as Black Kingdom and DEMON. “On August 12, 2021, we identified and blocked a number of emails sent to Abnormal Security customers soliciting them to become accomplices in an insider threat…

Read More

4 Viral Apps Risking Your Personal & Smartphone Security

4 Viral Apps Risking Your Personal & Smartphone Security

Mobile phones have gone through an incredible transformation since their inception in the 1970s. Now, the sheer number of applications is dizzying, as are their privacy policies; however, smartphone apps can bring hours of fun and belly laughs, and occasionally, a viral app captures the world’s attention. Don’t let potential risks to your personal information safety ruin all smartphone apps for you. All you need to share and play safely is a few tips to help you identify which apps are OK to use and how to navigate them intelligently.  Check out these four viral apps that…

Read More

4 Viral Apps Risking Your Personal & Smartphone Security

4 Viral Apps Risking Your Personal & Smartphone Security

Mobile phones have gone through an incredible transformation since their inception in the 1970s. Now, the sheer number of applications is dizzying, as are their privacy policies; however, smartphone apps can bring hours of fun and belly laughs, and occasionally, a viral app captures the world’s attention. Don’t let potential risks to your personal information safety ruin all smartphone apps for you. All you need to share and play safely is a few tips to help you identify which apps are OK to use and how to navigate them intelligently.  Check out these four viral apps that…

Read More

Understanding The Importance of Designing for Security

Understanding The Importance of Designing for Security

By Camille Morhardt, Director of Security Initiatives and Communications at Intel, and Tom Garrison, VP and GM of Client Security Strategy and Initiatives at Intel Robust security is a necessary and critical component of achieving a high-quality product. This is obvious when we consider security in a home or safety in a car or an airplane. And it’s the same with computing devices. From the initial architecture formation through the device build process to ongoing…

Read More

Maintaining access control for employees and preventing new hire fraud

Maintaining access control for employees and preventing new hire fraud

Maintaining access control for employees and preventing new hire fraud | 2021-08-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Great Resignation hits IT departments and companies are switching strategies

Great Resignation hits IT departments and companies are switching strategies

To ensure business continuity amid high turnover, many CIOs are planning to alter their strategies to make the company “less dependent on employee institutional knowledge,” says PwC. Image: iStock/alphaspirit After a year of layoffs and hiring freezes, companies have increased hiring in recent months. At the same time, a tight labor market and Great Resignation of sorts has companies using deal sweeteners to attract top talent and fill openings. On Thursday, PwC released the results…

Read More

Attack that defeats AMD chip security possible, unlikely

Attack that defeats AMD chip security possible, unlikely

AMD likes to crow about how its Epyc server processors can encrypt the content of virtal machines while they’re in operation so they are secure and isolated, preventing other VMs on the processor from accessing the encrypted contents. Well, researchers from the Technical University of Berlin have found a weakness in that feature, known as Secure Encrypted Virtualization (SEV), and published a theoretical attack that defeats the protection. The paper ”One Glitch to Rule Them…

Read More

How to protect your T-Mobile account in light of the latest data breach

How to protect your T-Mobile account in light of the latest data breach

In response to a breach that compromised the personal data of millions of subscribers, T-Mobile customers should change their password and PIN and set up two-step verification. A cyberattack against T-Mobile has resulted in the theft and compromise of certain personal data of almost 50 million people. This week, the carrier acknowledged a major data breach in which cybercriminals obtained the first and last names, dates of birth, Social Security numbers (SSNs) and driver’s license/ID…

Read More
1 3,533 3,534 3,535 3,536 3,537 3,941