US Locks Up Key Player in Nigerian Romance Scam

US Locks Up Key Player in Nigerian Romance Scam

An Oklahoma man has been sent to prison for his role in an online romance scam that defrauded victims across the United States out of at least $2.5m.  Norman resident Afeez Olajide Adebara was handed a custodial sentence on Friday after pleading guilty on November 3, 2020, to conspiracy to commit money laundering.  According to court documents, 36-year-old Adebara acted as the manager of a group of money launderers involved in the scam.  Between 2017 and November…

Read More

How to utilize openssl in Linux to check SSL certificate details

How to utilize openssl in Linux to check SSL certificate details

SSL certificates are an integral component in securing data and connectivity to other systems. Learn tips on how you can use the Linux openssl command to find critical certificate details. Image: Getty Images/iStockphoto Administering SSL certificates can be quite a chore, especially when it comes time to renew or replace them. Expiring SSL certificates can be devastating for technological operations, with the impact ranging from worrisome browser error messages to complete production outages. Therefore, it’s…

Read More

CISA Announces New Chief of Staff

CISA Announces New Chief of Staff

The United States Cybersecurity and Infrastructure Security Agency (CISA) has appointed Kiersten Todt as its new chief of staff.  In her new role, cybersecurity veteran Todt will be tasked with allocating resources, planning, and supporting CISA’s goals through the creation of long-term objectives.  CISA director Jen Easterly, in an announcement earlier today, described Todt as “extraordinarily well-qualified for this critical role.” Easterly added: “I am particularly excited to be able to draw upon Kiersten’s leadership ability and…

Read More

Offense Activities Sharing in Criminal Justice Case

Offense Activities Sharing in Criminal Justice Case

By Milica D. Djekic The criminal justice case could include a broad spectrum of details getting the need to be deeply explored and investigated by the case management team and the other officers. The offense activities are not only limited to the crime scene and they can get delivered, shared and transferred domestically, regionally or in the transnational manner. In this effort, we would analyze the common criminal justice scheme being the theft that can…

Read More

Massachusetts introduces committee to address cybersecurity

Massachusetts introduces committee to address cybersecurity

Massachusetts introduces committee to address cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

IoT device attacks double in the first half of 2021, and remote work may shoulder some of the blame

IoT device attacks double in the first half of 2021, and remote work may shoulder some of the blame

The smart home could be ripe for IoT device attacks as cybercriminals rake in record ransomware payments. Remote work may be responsible for the increase in attacks, Kaspersky says. Image: GettyImages/Andrey Suslov The modern home is chock full of myriad Internet of Things devices ranging from doorbell video cameras to smart pet feeders. While these products may offer a number of conveniences, smart devices also provide new entry points and potential security vulnerabilities for online…

Read More

Technology ownership and risk management: The critical step corporate security professionals are making

Technology ownership and risk management: The critical step corporate security professionals are making

Technology ownership and risk management: The critical step corporate security professionals are making | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Protect your endpoints with top EDR software

Protect your endpoints with top EDR software

Endpoint detection and response (EDR) software detects and identifies threats on network-connected devices. Compare features of top EDR tools. Image: Getty Images/iStockphoto Remote work has skyrocketed over the last year, leading to many workers accessing company information on personal devices. According to an HR Dive study, 60% of these personal devices aren’t monitored by security tools. Even if your workforce isn’t remote, unsecured personal devices can still provide hackers with easy access to company data…

Read More

Smartphone Security: Five Steps Beating and Blocking Robocalls

Smartphone Security: Five Steps Beating and Blocking Robocalls

Some scams can make a telltale sound—rinnng, rinnng! Yup, the dreaded robocall. Not only are they annoying, but they can also hit you in the pocketbook.   In the U.S., unwanted calls rank as the top consumer complaint reported to the Federal Communications Commission (FCC), partly because scammers have made good use of spoofing technologies that serve up phony caller ID numbers. As a result, that innocent-looking phone number may not be innocent at all.  Whether the voice on the other end of the smartphone is recorded…

Read More
1 2,107 2,108 2,109 2,110 2,111 2,601