cybercrime
Global cyberconflicts, hacktivism and disruptions are on the horizon
As the data breach landscape continues to evolve, companies must try to stay ahead of the curve and be prepared to respond to any type of security incident. To provide a …
How UK businesses plan to tackle security threats in 2016
81% UK IT decision makers experienced some sort of data or cyber security breach in their organisation in 2015, according to training company QA. 66 per cent said that the …
GPS faker software broadcasts spam across thousands of fake profiles
Different from traditional email spam, social spam can reach a large audience by nature of the platform and can appear trustworthy since it is coming from people in your …
Four ways an attacker can infiltrate an organization by diverting security solutions
Employing one of the many security solutions on the market today does not mean your organization is immune to infiltration – that much is clear from the constant string …
ModPOS: The most sophisticated POS malware to date
Elements of ModPOS date back as far as early 2012. It targeted US retailers in late 2013 and throughout 2014, and is expected to continue to do so in the future. According to …
Two arrested for helping malware developers evade AV software
Two suspects have been arrested on suspicion of operating a website offering services to help criminals overcome and avoid anti malware software, following a joint …
Most consumers concerned about becoming victims of online crime
Globally, 62 percent of consumers believe it’s more likely their credit card information will be stolen online compared to only 38 percent who think it’s more likely they will …
Man stole special agent’s identity, executed a complex identity theft scheme
Rohit Jawa, 25, formerly of Cincinnati, Ohio, pleaded guilty to an indictment charging him with eight counts of wire fraud and one count of aggravated identity theft.Based on …
How online fraud will evolve in 2016
While 2015 is drawing to a close, the security fraud community is preparing for more battles ahead in 2016. And next year, consumer-facing web and mobile apps are up against a …
40% of companies expect a data breach next year
Clearswift released their annual Clearswift Insider Threat Index (CITI) exploring why firms have been slow to address internal security threats and including data from …
How fake users are impacting business through acts of fraud and theft
A new report by The Ponemon Institute highlights the average economic value of a company’s user base ($117M) and the financial and brand reputation damage that can be done if …
Cracks in the mobile ecosystem, Internet-connected devices
The interconnectivity of technology has led to a point where many devices are potentially vulnerable, and in the third quarter, the real world impacts of cyberattacks became …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025