Even after being given a new, secure device just before his inauguration, President Trump still reportedly uses his old phone. Read More ▶ |
|
| eBook: Safebreach Can you answer the question "Are we secure?" If you're only as strong as your security defenses, understanding how well the controls that you've deployed will stand up to attackers is critical. This eBook looks at how breach simulations can quantify your security risks and continuously validate the efficacy of your security controls. Read More ▶ | LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by network filters to allow HR departments the freedom to communicate with prospective job candidates. Read More ▶ |
| Ironically, cyber criminals have to battle fraudsters too. To help them, a new web service is warning the hacker community who among them can’t be trusted. Read More ▶ |
| | Two instances of tweets from National Park Service accounts that became political hot potatoes in the last few days were the result of bad password management, according to officials. Read More ▶ |
| About three months ago, an instructor at Gurnick Academy, a California-based nursing school, had his biggest fear come alive. When he tried to access his lectures, the files were encrypted. The teacher was literally locked out of his classroom. Read More ▶ |
| One of the leading cybercrime investigators at antivirus vendor Kaspersky Lab was reportedly arrested in Russia as part of a probe into activities that could represent high treason. Read More ▶ |
| LeakedSource, a breach notification service that exposed some of 2016’s largest data breaches, might be facing a permanent shutdown. According to a forum post on a well-known marketplace, the owner of LeakedSource was raided earlier this week, though exact details of the law enforcement action remain a mystery. Read More ▶ |
| White Paper: Safebreach Download the SafeBreach Hacker's Playbook, the first report of its kind to report on enterprise security trends and issues from the perspective of an attacker. Incorporating analysis of more than 4 million breach methods executed in real-world enterprise deployments, you will learn how attackers view you as a target, the mistakes security teams are making in their organization, and best practices to stay secure. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|