Over 90% of Organizations Hit by a Mobile Malware Attack in 2020

Over 90% of Organizations Hit by a Mobile Malware Attack in 2020

Almost every global organization suffered at least one mobile malware attack in 2020, according to a new report from Check Point. The security vendor polled 1800 customers of its Harmony Mobile device threat protection product to compile its 2021 Mobile Security Report. Of the near-total number that faced a mobile attack last year, 93% of incidents originated in a device network, and were either phishing attempts (52%), C&C communication with malware already on the device…

Read More

Man Arrested After Failed AWS Bomb Plot

Man Arrested After Failed AWS Bomb Plot

A Wichita Falls man has been charged after allegedly planning to blow up an Amazon Web Services (AWS) datacenter in Virginia. Seth Aaron Pendley, 28, was arrested last Thursday after procuring what he thought was an explosive device from an undercover FBI officer in Fort Worth. He was charged with a malicious attempt to destroy a building with an explosive, after a concerned individual flagged “alarming” statements he made on a militia group forum under…

Read More

The Gaylord Opryland Resort boosts security

The Gaylord Opryland Resort boosts security

The Gaylord Opryland Resort boosts security | 2021-04-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Timing isn’t everything but it helps

Timing isn’t everything but it helps

Timing isn’t everything but it helps | 2021-04-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How Tripwire Can Help U.S. Federal Agencies Implement the CIS Controls

How Tripwire Can Help U.S. Federal Agencies Implement the CIS Controls

Digital attackers are increasingly launching sophisticated campaigns in an effort to target U.S. federal agencies and other organizations. Two recent examples demonstrate this reality. These are the SolarWinds supply chain attack and the HAFNIUM Exchange exploit campaign. The SolarWinds Supply Chain Attack In mid-December 2020, the security community learned that an advanced persistent threat (APT) had targeted SolarWinds’ Orion network management software with a backdoor. Tripwire VERT warned that the those responsible for the attack…

Read More

More Power, More Responsibility

More Power, More Responsibility

What the Defense and Intelligence Communities Need to Know About 5G By Brian Green, Senior Vice President, Booz Allen Hamilton With the potential to revolutionize global telecommunications, fifth-generation mobile technology (5G) forges connections between physical devices and the digital world – creating new opportunities to share, compute, and act upon information with unprecedented speed and at an unheard-of scale. For the defense and intelligence communities, 5G opens myriad possibilities to address operational needs, enhance mission…

Read More

Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

By Boyd White, Director, Technical Account Management, Tanium Endpoint management is critical as agencies try to secure the knowns and unknowns in their IT environments. As cybercriminals become more sophisticated, IT teams need to not only mitigate known cyber breaches – but also need faster visibility and control when cybercriminals adapt their techniques. The recent threat of compromised software at SolarWinds is a good example of the quick pace in which agencies were forced to…

Read More

2021 Cybersecurity Outlook: The More Things Change, The More They Stay the Same

2021 Cybersecurity Outlook: The More Things Change, The More They Stay the Same

By Nir Gaist, Nyotron, Founder Cybersecurity has gone through many phases over the last few decades. Today, we hear about a new, more volatile-than-the-last attack every day that has the potential to disrupt business. These cyber-threats are hazardous to company structure and can lead to interruptions in production and loss of revenue. While these attacks may seem unavoidable, it is important to understand that a proper cybersecurity strategy, with the right defense mechanisms in place,…

Read More

Facebook Removes 16k Groups for Trading Fake Reviews

Facebook Removes 16k Groups for Trading Fake Reviews

Social media giant Facebook has removed thousands of groups from its platforms over the trading of fake and misleading reviews. The cull occurred after two separate interventions by Britain’s competition watchdog, the Competition and Markets Authority (CMA). In January 2020, Facebook committed to improving its identification, investigation, and removal of groups and other pages where misleading and fake reviews were being traded, and to preventing their return. Four months later, Facebook gave a similar pledge…

Read More

US Jails Cyber-stalker Who Targeted Attack Survivor

US Jails Cyber-stalker Who Targeted Attack Survivor

The United States has imprisoned the cyberstalker of a woman who, as a child, survived a violent assault that claimed the life of her friend.  According to court records, the victim was in a Texas bedroom with another girl in December 1999 when an assailant entered and slit both the little girls’ throats. The perpetrator was later caught and convicted of the crime. Alvin Willie George of Cross City, who has no connection to the…

Read More
1 2,318 2,319 2,320 2,321 2,322 2,563