Arrest Made Over Multi-million-dollar BEC Scam

Arrest Made Over Multi-million-dollar BEC Scam

Texas law enforcement officers have made an arrest in connection with a multi-million-dollar wire fraud and money laundering scheme involving Business Email Compromise (BEC). Guillermo Perez was taken into custody Wednesday morning for allegedly defrauding businesses and individuals of more than $2m through cyber-scams and bank fraud schemes. An indictment unsealed on June 9 accuses 26-year-old Houston resident Perez of participating in the illegal scam from at least October 2018 to October 2019. Perez is accused of impersonating…

Read More

How to secure your WordPress login with 2FA

How to secure your WordPress login with 2FA

Jack Wallen shows you how to add two-factor authentication to your WordPress sites to avoid possible unwanted intrusion. Image: Jack Wallen Nothing is perfect. No matter what you do to lock down every account you have, you’re still at risk. However, doing nothing is akin to opening the metaphorical door and inviting trouble in. You don’t want that. Even though it might seem futile, you still want to enable every possible hurdle to make the…

Read More

Data Loss Prevention in Turbulent Times

Data Loss Prevention in Turbulent Times

By Otavio Freire, CTO & Co-Founder at SafeGuard Cyber Data, the saying goes, is the new oil. This probably understates the case: Not only is data at the core of the biggest businesses on earth but unlike oil, more and more of it is being created, at an exponential pace. Around 2.5 quintillion bytes of new data every day, to be precise. The most valuable forms of data exist within enterprises. Customer data, financial data,…

Read More

Texas to Publish Data Breach Notifications

Texas to Publish Data Breach Notifications

Lawmakers in Texas have passed a bill requiring notices to be published online of any data breaches involving the personal information of 250 or more Lone Star State residents. The unanimously passed House Bill 3746, which amends the Texas Business and Commerce Code §521.053, requires the Texas Attorney General’s Office to post the breach notifications to its public-facing website. Notifications must be uploaded to the website within 30 days of receipt, and listings of organizations impacted by a…

Read More

Microsoft Exchange Server vulnerabilities, ransomware lead spring 2021 cyberattack trends

Microsoft Exchange Server vulnerabilities, ransomware lead spring 2021 cyberattack trends

Cisco’s Talos team said 35% of incidents led back to Microsoft Exchange Server vulnerabilities reported early in 2021, but new ransomware families have been appearing to fill the Emotet hole, too. Rawpixel, Getty Images/iStockphoto Cisco’s Talos Intelligence Group has released its incident response trends report for spring 2021, and found that Microsoft Exchange Server vulnerabilities reported in early 2021 were the most detected incident over the past three months. Talos said the four Exchange Server…

Read More

#Infosec21: Lack of Vision Explains Cyber Skills Shortage

#Infosec21: Lack of Vision Explains Cyber Skills Shortage

The cybersecurity skills gap is caused by a lack of vision in the industry rather than it being a pipeline problem, argued Wendy Nather, head of advisory CISOs at Cisco, during her keynote address on day three of the Infosecurity Europe virtual conference. Nather, who was recently inducted into the Infosecurity Hall of Fame, believes it is a complete misnomer that there is a lack of talent available to fill the expanding number of security roles. Instead,…

Read More

Are Virtual Machines the New Gold for Cyber Criminals? | McAfee Blogs

Are Virtual Machines the New Gold for Cyber Criminals? | McAfee Blogs

Introduction Virtualization technology has been an IT cornerstone for organization for years now. It revolutionized the way organizations can scale up IT systems in a heartbeat, allowing then to be more agile as opposed to investing into dedicated “bare-metal” hardware. To the outside untrained eye, it might seem that there are different machines on the network, while in fact all the “separate” machines are controlled by a hypervisor server. Virtualization plays such a big role…

Read More

How to Protect Your Corporate Brand and Reputation in the Digital Age (No Fee) Virtual Seminar

How to Protect Your Corporate Brand and Reputation in the Digital Age (No Fee) Virtual Seminar

Click Here Register Now A trusted brand reputation is the product of relentless hard work and passionate devotion. Its importance can not be overstated—it builds company loyalty, develops a strong consumer base and establishes a firm as an industry leader. Sadly, it can also be destroyed with just a few keystrokes by someone posting anonymously in the digital space, shattering what once was a successful and thriving company. Frank Figliuzzi, former assistant director of the…

Read More

Security company makes

Security company makes

Qrypt launches a quantum Entropy-as-a-Service and access to quantum random number generators hardware. Image: iStockphoto/niplot Just as the revolution will not be televised, the end of encryption will not be announced via press release. A new cryptography company, Qrypt, launched a service today to help companies get ahead of that unavoidable day. Qrypt announced a web portal that provides access to a quantum cryptography API. This will allow most businesses to integrate the highest level…

Read More
1 2,232 2,233 2,234 2,235 2,236 2,581