Cybersecurity

 
 
  • Could A Tiny Chinese Hardware Implant Control US Servers?

    A stealth component smaller than a grain of rice is said to have been embedded in circuit boards that were manufactured in China and then used in servers of major U.S. companies, including Amazon and Apple. That’s...

    • Posted 2 days ago
    • 0
  • Cybersecurity ABCs

    The numbers are mind-numbing. In the U.S. alone by mid-year there had already been more than 850 reported data breaches, with more than 34 million records exposed. Meanwhile, the quantity of extant data – and thus potential...

    • Posted 3 days ago
    • 0
  • Data Threats Are Often Internal

    Threats to data and security don’t always start on the outside. Many times, actors within an organization carry out sophisticated and malicious attacks designed to steal money or IP or both. Without the right form of monitoring,...

    • Posted 4 days ago
    • 0
  • Focus On Fundamentals To Manage Risk

    There are so many attack methods and cybercriminals with various motivations, how do you know what to concentrate on as you put together a risk management plan? There are a few rules to keep in mind. Focus...

    • Posted 5 days ago
    • 0
  • Cyberesecurity Professionals Mobile, Dissatisfied.

    According to a 2017 survey, about half of all cybersecurity practitioners are solicited for a job opportunity at least weekly. Over a month’s time, just about all cybersecurity employees have one or more opportunities to leave their...

    • Posted 5 days ago
    • 0
  • Tough Cyber Policies From Trump Lambasted As “Reckless”

    A security expert from academia maintains the Trump administration cyber strategy (which she says involves “using offensive cyberattacks for defensive purposes”) is dangerously aggressive and risks escalating conflict with adversaries who have shown they are capable of...

    • Posted 1 week ago
    • 0
  • Phone Phishing Scams That Sound Like The Real Thing

    If anything, it’s even more insidious than phishing by email. One of their targets got a succession of calls from what appeared to be his credit union. A security-conscious guy, he let two go to voicemail, but...

    • Posted 1 week ago
    • 0
  • With Enemies Like This Who Needs Friends?

    Online fans of Star Wars are, guess what? – polarized – and according to an academic paper released by researcher Mort Bay at the University of Southern California, Russian hackers have exploited this split “to further propagate...

    • Posted 2 weeks ago
    • 0
  • Behavioral Biometric Data Meets Data Privacy Compliance

    Experience shows that passwords are easily compromised. The search for a better authentication method is ongoing, but for the time being, biometrics seem to be a secure and logical login option. In theory, no one should be...

    • Posted 3 weeks ago
    • 0
  • SEC Fines Investment Firm $1 Million After Data Breach

    In its first enforcement charging a violation of the Identity Theft Red Flags Rule, the SEC has fined a Des Moines-based broker-dealer and investment adviser $1 Million. According to the SEC, hackers were able to impersonate the...

    • Posted 3 weeks ago
    • 0