ballot

Paper Ballots: More Secure Than E-voting or Blockchain

Voting on paper is best. Letting computers help is bound to lead to trouble, experts say. And using a blockchain is dumb idea, too ...
Security Boulevard
Twitter Hack—Old Dog, New Tricks

Twitter Hack—Old Dog, New Tricks

The recent Twitter breach involving Bitcoin transfer scams is not a new concept. SlashNext’s Threat Lab sees dozens of phishing sites each day because cybercriminals see it as an easy way to ...
pandemic

Fighting Fraud Amid a Pandemic? Follow the Money

In what feels like society’s longest five-month stretch in a generation, it has become cliché to comment that the global pandemic has impacted nearly every part of our lives. In economic terms, ...
Security Boulevard

It could happen to anyone…

The headline is eye catching: a data breach at a highly respected security training organization when an employee falls for a phishing email. It is ...
TikTok

TikTok and National Security: The Need for a Comprehensive U.S. Privacy Law

| | data, Privacy, social media
Last week, President Donald Trump threatened to ban the popular social media platform TikTok, whose corporate owner is a Chinese company with alleged ties to the Chinese Communist Party. Trump’s stated grounds ...
Security Boulevard
Top 3 Reasons Gaps in Microsoft and Proofpoint Email Security Are Leaving Organizations Vulnerable

Top 3 Reasons Gaps in Microsoft and Proofpoint Email Security Are Leaving Organizations Vulnerable

Email Account Takeover (ATO) attacks occur when a threat actor gains unauthorized access to an email account belonging to someone else. Cybercriminals obtain stolen user credentials through trade or purchase on the ...
Twitter confirms internal tools used in bitcoin-promoting attack ...

Cyber Security Roundup for August 2020

A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, July 2020.The standout hack of July 2020, and possibly of ...
hackers

The Next Generation of Hackers

In This Issue: "The Next Generation of Hackers". Being a hacker requires curiosity, certain computer security skills, and a mindset for figuring out what criminals will do before they do it. So, ...
US DOJ Charges Three Young Men for Alleged Roles in July Twitter Hack

US DOJ Charges Three Young Men for Alleged Roles in July Twitter Hack

Last week, the US Department of Justice (DOJ) charged three men for their alleged roles in one of the largest Twitter breaches in history, which led to the hijacking of 130 high-profile ...
Russians

‘Russians’ Hack News Websites, Sow Anti-NATO Sentiment

Researchers discover pro-Russian narratives being spread via hacked news websites, aimed at attacking NATO ...
Security Boulevard