How important is cybersecurity to mobile subscribers?

How important is cybersecurity to mobile subscribers?

(This is a guest post by Ian Parkes, director at Coleman Parkes Research, a full-service, UK-based, end-to-end B2B market research company covering international telecom and a wide range of other industries.) My ...
Bad Actors Could Exploit US Mail-In Voting System, FBI and CISA Warn

Bad Actors Could Exploit US Mail-In Voting System, FBI and CISA Warn

A joint statement released by the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday warns that foreign actors and cybercriminals are likely to exploit this year’s US mail-in voting ...
Allot BusinessSecure | A Cybersecurity Solution Enabling Service Providers to Protect the SMB Market

Simple and reliable network security for SMBs

When it comes to cybersecurity, what’s the difference between SMBs and large enterprises? If you guessed that the difference is related to the number of cyberattacks, then you’d be wrong. SMBs suffer ...
emergencies and cyberattacks

Emergencies and Cyberattacks: 3 Common Scams

 Emergencies and cyberattacks are hard enough on their own. But disasters bring out the worst in cybercriminals, and if an event can be exploited, you can be sure that a hacker is ...
Security Boulevard
prepare

6 Tips for Remote Workers to Avoid Cybercriminals

Remote workers can be especially vulnerable to cyberattacks. Here are six ways to prevent that The COVID-19  pandemic is affecting every facet of our daily lives, including the ways cybercriminals exploit their ...
Security Boulevard

Cybercriminals’ Motivations during Catastrophic Times

Brittany Haynes wrote an article about “How Criminals Are Benefitting From the COVID-19 Crisis” on March 19, 2020, which is available at https://www.igi-global.com/newsroom/archive/malicious-threat-your-inbox-covid/4477?utm_source=IGI+Global+Products+and+Publishing+Opportunities&utm_campaign=58a5a8500d-EMAIL_CAMPAIGN_Research_Trends_1_19_wk1_COPY_01&utm_medium=email&utm_term=0_bcbd627034-58a5a8500d-47781814 Haynes’s article references a March 9, 2020 article by ...
Fake Obama created using AI video tool - BBC News

Cybersecurity Threats for 2020

It's a new year, which means new threats. What are cybersecurity experts predicting for 2020? Find out in our February blog, "Cybersecurity Threats for 2020." Continue Reading > The post Cybersecurity Threats ...
Connected Toys: What Are the Security & Privacy Risks?

Connected Toys: What Are the Security & Privacy Risks?

(written with Eliyah Havemann and Dan Bloom) As we approach the end of the year and enter the season of holiday gifting, it’s an excellent time to weigh-in on “high tech” connected ...