Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS » Commercial Fraud

The cyber attack lifecycle

The cyber attack lifecycle

The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While important, many of today’s advanced and motivated threat actors are circumventing perimeter based…

Western Union admits to criminal violations in AML and wire fraud.

Western Union admits to criminal violations in AML and wire fraud.

The Western Union Company (Western Union), a global money services business headquartered in Englewood, Colorado, has agreed to forfeit $586 million and enter into agreements with the Federal Trade Commission,…

All about the criminal rats behind Spora ransomware.

All about the criminal rats behind Spora ransomware.

Nowadays, ransomware has become the most dangerous type of criminal malware. Most of the new families are prepared by amateurs (script-kiddies) and they are distributed on a small scale. Inside…

The rise of digital organized crime and the cybercops.

The rise of digital organized crime and the cybercops.

While ransomware is a rising threat, it’s child’s play compared to what’s coming. We will see the rise of digital organized crime and the need for as many digital cops as…

Five cybersecurity resources that spooks relies on.

Five cybersecurity resources that spooks relies on.

Bob Flores, former CTO with the Central Intelligence Agency (CIA) in the US, and now managing partner for Cognito Corp, has shared some key insights around data security in Australian…

Ransomware and Computers under siege.

Ransomware and Computers under siege.

There’s so much doom and gloom in the security industry because of ransomware. And yet, occasional success stories inspire us to fight back. READ ARTICLE HERE RANSOMWARE IS MALWARE that…

Brazil: Cybercrime in 2015.

Brazil: Cybercrime in 2015.

Short News by Victor Björgan .- Brazilian cybercriminals mostly operate on the surface web via public forums and apps, largely due to the cybercriminals’ disregard for law enforcement and law…

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

Senate votes in favor of bill critics including Edward Snowden say will allow the government to collect sensitive personal data unchecked. Robyn Greene of the New America Foundation characterized the…

ID theft hit 18 million people, 7% of U.S. population last year targeting bank acc and credit cards.

ID theft hit 18 million people, 7% of U.S. population last year  targeting bank acc and credit cards.

Almost 18 million people were victims of identity theft in the United States last year, with the majority of crimes targeting credit cards and bank accounts, the Department of Justice…

Washington DC: hub for cyber security technology companies.

Washington DC: hub for cyber security technology companies.

Many U.S. companies  wants to buy  software that fortifies their networks and fends off hackers from cyber-attacks like those that afflicted  big-name businesses, including Target, JPMorgan Chase, Home Depot, Citigroup and…

Page 1 of 41234