Domain validation glitch prompts an abrupt decision. Let’s Encrypt, a nonprofit that has played a major role in pushing the use of encryption on the Web, today revoked more...
Read moreEternalBlue Longevity Underscores Patching Problem
March 5 2020Three years after the Shadow Brokers published zero-day exploits stolen from the National Security Agency, the SMB compromise continues to be a popular Internet attack. EternalBlue, the exploit publicly...
Read moreEternalBlue Longevity Underscores Patching Problem
March 5 2020Three years after the Shadow Brokers published zero-day exploits stolen from the National Security Agency, the SMB compromise continues to be a popular Internet attack. EternalBlue, the exploit publicly...
Read moreAt many companies, there’s a gap between security and what is generally called operations, or more colloquially, ‘the rest of the organization’. That gap is becoming an issue, because...
Read moreAt many companies, there’s a gap between security and what is generally called operations, or more colloquially, ‘the rest of the organization’. That gap is becoming an issue, because...
Read more7 Loyalty Program and Rewards App Attacks
March 4 2020The number of attacks targeting loyalty and rewards programs is growing. Here are some of the lowlights. Image Source: Adobe (Andrey Popov) Cybercriminals love loyalty cards and mobile pay...
Read more7 Loyalty Program and Rewards App Attacks
March 4 2020The number of attacks targeting loyalty and rewards programs is growing. Here are some of the lowlights. Image Source: Adobe (Andrey Popov) Cybercriminals love loyalty cards and mobile pay...
Read moreAvoiding the Perils of Electronic Communications
March 4 2020Twitter, Slack, etc., have become undeniably important for business today, but they can cause a lot of damage. That’s why an agile communications strategy is so important. One of...
Read moreAvoiding the Perils of Electronic Communications
March 4 2020Twitter, Slack, etc., have become undeniably important for business today, but they can cause a lot of damage. That’s why an agile communications strategy is so important. One of...
Read moreMessaging / Smishing Attacks
March 4 2020Overview One of the most common ways cyber attackers attempt to trick or fool people is by scamming you in email attacks (often called phishing) or try to trick...
Read more
Recent Comments