Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » CRIME

Monero Cryptocurrency attacked.

Monero Cryptocurrency attacked.

Cyber Security researchers (Palo Alto Networks) detected a big cryptocurrency mining operation,  than started probably in late August last year. Palo Alto Researchers informed the mining operation impacted more than 30…

How Ransomware take your data hostage

How Ransomware take your data hostage

Cybersecurity Trends 2018

Cybersecurity Trends 2018

During 2018, be aware of potential security threats and learn how to prevent them. Here’s a summary  of some of the flaws and cybercrime organizations ,  and other threats you…

Big Social Media implicated in “extremist material & fake news” being published.

Big Social Media implicated in “extremist material & fake news” being published.

Prime Minister Malcolm Turnbull has joined Britain’s Prime Minister Theresa May in calling on social media companies to crack down on extremist material being published by users. It comes in the wake…

Face Recognition helping fight crime in Brazil

Face Recognition helping fight crime in Brazil

A BRITISH company’s pioneering crime prevention system is helping to fight crime in Brazil by alerting businesses when known criminals enter their premises. London-based Facewatch, working with Staff Security Brazil, has…

About the lone wolf terrorist threat.

About the lone wolf terrorist threat.

President Donald Trump and his administration formulate their plans to combat terrorism, they will discover that dealing with the threat of lone wolf terrorism will prove to be the most…

Community Policing: a Growing Trend.

Community Policing: a Growing Trend.

Public discourse on community policing hasn’t been so high since the mid-1990s, when a citizen filmed the mistreatment of Rodney King on the streets of Los Angeles. Following the relatively…

Vulnerability Assessment: how to get Management Support for Crisis Planning

Vulnerability Assessment: how to get Management Support for Crisis Planning

Two-thirds of all crises are the smoldering kind that are both predictable and preventable. Yet, it’s virtually impossible to prepare effectively for potential crises if you don’t know where and…

The cyber attack lifecycle

The cyber attack lifecycle

The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While important, many of today’s advanced and motivated threat actors are circumventing perimeter based…

New Money Laundering modus operandi: Transaction Laundering.

New Money Laundering modus operandi: Transaction Laundering.

Transaction laundering is the new sophisticated form of money laundering and terrorism financing  and is one of the biggest challenges facing the AML regime today. This advanced merchant-based fraud scheme…

Page 1 of 59123Next ›Last »