Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS » Events

All about the criminal rats behind Spora ransomware.

All about the criminal rats behind Spora ransomware.

Nowadays, ransomware has become the most dangerous type of criminal malware. Most of the new families are prepared by amateurs (script-kiddies) and they are distributed on a small scale. Inside…

Investors: Anticipatory Intel could Predict Social Unrest as Early as 3 to 5 Days Out.

Investors: Anticipatory Intel could Predict Social Unrest as Early as 3 to 5 Days Out.

According to  CIA´s Deputy Director for Digital Innovation Andrew Hallman, the Agency has significantly improved its “anticipatory intelligence,” using a mesh of sophisticated algorithms and analytics against complex systems to better…

Businesses competitive advantage is having successful cyber security actions.

Businesses competitive advantage is having successful cyber security actions.

In an environment where companies have to compete on a global scale, is important having an experienced staff to address technology security concerns and be able to act proactively to emerging…

Dell Threat Report: warned global cybercrime increased in 2015.

Dell Threat Report:  warned global cybercrime increased in 2015.

Multinational computer technology company Dell on Saturday warned that cybercrime increased significantly around the world in 2015 despite organisations deploying end-to-end security solutions perfectly. Cybercriminals employed a number of new…

Sobre hermanos y parejas en una organización terrorista.

Noticias por Victor Bjorgan Barrios.- Después de los ataques terroristas en París, los analistas de inteligencia comenzaron a investigar la relación entre hermanos  dentro de una organización terrorista, así como…

Brazil: Cybercrime in 2015.

Brazil: Cybercrime in 2015.

Short News by Victor Björgan .- Brazilian cybercriminals mostly operate on the surface web via public forums and apps, largely due to the cybercriminals’ disregard for law enforcement and law…

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

U.S. Senate passed Cybersecurity Information Sharing Act – CISA bill.

Senate votes in favor of bill critics including Edward Snowden say will allow the government to collect sensitive personal data unchecked. Robyn Greene of the New America Foundation characterized the…

Neglect is biggest threat in cyber corporate data.

Neglect is biggest threat in cyber corporate data.

Today, neglect is actually one of the biggest threats to corporate data. According to the 2015 Cyber Risk Report from HP Security Research, all nine of the most dangerous enterprise…

China and U.S. are working on code of cyberconduct.

China and U.S. are working on code of cyberconduct.

After three days of negotiations, China and the US are working on a “code of conduct” for online espionage and hacking after months of trading accusations over cyber attacks. READ…

IBM enabling Police agencies to access advanced crime analytics.

IBM enabling Police agencies to access advanced crime analytics.

IBM’s i2 Coplink police software is moving to the cloud, enabling agencies of any size to access advanced crime analytics capabilities. Coplink enables police officers in different states to consolidate…

Page 1 of 512345