Beware of these 4 Scams

Blog Aug 25, 2016 Robert Siciliano
Profile photo of Robert Siciliano

IRS The e-mail (or phone call) says you owe money; if you don’t pay it immediately, you’ll be put in jail or fined.The scammer may know the last four d...

Read More | Join the discussion!

10 Ways to Protect Against Dual Revenue Attacks

Blog Aug 25, 2016 Grazielle J
Profile photo of Grazielle J

To many financially motivated cybercriminals, one of the most valuable commodities is data. But not all data is valued equally. They want data that is fres...

Read More | Join the discussion!

Will Biometrics replace Passwords?

Blog Aug 23, 2016 Robert Siciliano
Profile photo of Robert Siciliano

The days of using a computer to access your bank account, using a password, may be coming to an end, to be replaced entirely (as some experts believe) with...

Read More | Join the discussion!

Critical Vulnerability Patched in GnuPG, Libgcrypt

Blog Aug 23, 2016 Grazielle J
Profile photo of Grazielle J

The GnuPG Project announced last week the availability of GnuPG and Libgcrypt updates that address a critical security problem affecting all versions relea...

Read More | Join the discussion!

Cyber Risk Prioritization: Fixing What Really Matters

Blog Aug 22, 2016 Grazielle J
Profile photo of Grazielle J

Today, even mid-sized organizations are dealing with thousands of vulnerabilities across their growing attack surface. Therefore, relying solely on existin...

Read More | Join the discussion!

What Your Security Team Can Learn From the Olympics

Blog Aug 21, 2016 Grazielle J
Profile photo of Grazielle J

The Olympics are such an inspirational time of year. Extraordinary athletes from around the world gather to attempt a lifelong goal of achieving Olympic ...

Read More | Join the discussion!

Shall We Play a Game? It’s a SIEM-ple Question.

Blog Aug 20, 2016 Grazielle J
Profile photo of Grazielle J

A simple question that led to a SIEM-ple solution. Well, maybe not so simple. To understand SIEM (security information & event management), it’s impo...

Read More | Join the discussion!

What is Malvertising?

Blog Aug 19, 2016 Robert Siciliano
Profile photo of Robert Siciliano

Malevolent advertising is called malvertising. The “ad” is placed on a website by cybercriminals who want control of your computer for financial gain....

Read More | Join the discussion!

Protect your Privacy on your iPhone

Blog Aug 17, 2016 Robert Siciliano
Profile photo of Robert Siciliano

If you have an iOS device, you may be leaking personal information about yourself—without even knowing it—because you’re not familiar with the privac...

Read More | Join the discussion!

Are You Part of the 70 Percent Who Are Clueless About Identity Theft?

Blog Aug 17, 2016 Robert Siciliano
Profile photo of Robert Siciliano

You’d think with all the media attention regarding data breaches, hackers and identity theft, that consumers would be more focused on their privacy and h...

Read More | Join the discussion!

More