The 20th anniversary of September 11: Reflections on the evolution of enterprise security

The 20th anniversary of September 11: Reflections on the evolution of enterprise security

The 20th anniversary of September 11: Reflections on the evolution of enterprise security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Protecting hospitals from supply-chain counterfeits and other security threats

Protecting hospitals from supply-chain counterfeits and other security threats

Protecting hospitals from supply-chain counterfeits and other security threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

The engagement effect: A CISO’s guide to securing hybrid workplace networks

The engagement effect: A CISO’s guide to securing hybrid workplace networks

The engagement effect: A CISO’s guide to securing hybrid workplace networks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Active Directory sits in a dangerous security blind spot

Active Directory sits in a dangerous security blind spot

Active Directory sits in a dangerous security blind spot | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

How to Talk to Your Grandparents About Cybersecurity

How to Talk to Your Grandparents About Cybersecurity

According to research from the FBI and FTC, cybercrimes against older adults cost more than $650 million in losses each year. Why? Unlike millennials and Generation Z, your grandparents weren’t born with a smartphone in their hands. On top of that, older adults tend to have more significant financial funds like retirement accounts, making them an ideal target for cybercriminals.   With Grandparent’s Day right around the corner, here’s a guide on how you can help keep your grandparents safe from the most common cybercrimes on…

Read More

How to Talk to Your Grandparents About Cybersecurity

How to Talk to Your Grandparents About Cybersecurity

According to research from the FBI and FTC, cybercrimes against older adults cost more than $650 million in losses each year. Why? Unlike millennials and Generation Z, your grandparents weren’t born with a smartphone in their hands. On top of that, older adults tend to have more significant financial funds like retirement accounts, making them an ideal target for cybercriminals.   With Grandparent’s Day right around the corner, here’s a guide on how you can help keep your grandparents safe from the most common cybercrimes on…

Read More

Prison for BEC Scheme Money Launderer

Prison for BEC Scheme Money Launderer

An Ontario resident, who admitted laundering tens of millions of dollars stolen by cyber-criminals in various wire and bank fraud schemes, is to spend the next 140 months in a United States federal prison. Dual Canadian and United States citizen Ghaleb Alaumary, formerly of Mississauga, was sentenced yesterday after pleading guilty to two counts of conspiracy to commit money laundering. He was further ordered to pay $30m in restitution to his victims and to serve three years of supervised…

Read More

Cyber-criminal Targets Dadsnet Founders

Cyber-criminal Targets Dadsnet Founders

A hacker who calls themself “The King” is demanding more than $40,000 to return control of a social media account to its rightful owners.  The access being held to ransom relates to an Instagram account belonging to 33-year-old Al Ferguson and his 43-year-old wife, Jen, who together founded a parenting forum geared toward fathers, Dadsnet.  For more than seven years, the entrepreneurial British couple have shared personal details of their lives with tens of thousands of their…

Read More

The top keywords used in phishing email subject lines

The top keywords used in phishing email subject lines

Some of these phrasings are standard day-to-day subject lines, but as one expert explained, “the attacker wants you to be moving too fast to stop and question if it’s legitimate.” Image: GettyImages/Maskot In recent months, hacking groups have brought critical aspects of U.S. infrastructure to a halt, and phishing is a popular tool in cybercriminal’s seemingly ever-expanding armamentarium of attack methods. On Wednesday, Expel released a report, highlighting the top keywords used in phishing attempt…

Read More

Hackers Steal Data from United Nations

Hackers Steal Data from United Nations

Hackers have broken into the computer network of the United Nations and made off with data, according to researchers at cybersecurity firm Resecurity.  Bloomberg reports that the unidentified cyber-criminals behind the theft appear to have gained access simply by using login credentials stolen from a UN employee.  Entry was gained by logging in to the employee’s Umoja account. Umoja, which means “unity” in Kiswahili, is the enterprise resource planning system implemented by the UN in 2015. It…

Read More
1 2,248 2,249 2,250 2,251 2,252 2,738