Facebook

The Shared Security Weekly Blaze – Facebook and your Financial Transactions, Smart Home Security, Critical HP Printer Vulnerabilities

This is the Shared Security Weekly Blaze for August 13, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket. This episode was ...
IoT Hackers Trick Brazilian Bank Customers into Providing Sensitive Information

IoT Hackers Trick Brazilian Bank Customers into Providing Sensitive Information

Radware Threat Research Center has identified a hijacking campaign aimed at Brazilian Bank customers through their IoT devices, attempting to gain their bank credentials. The research center has been tracking malicious activity ...
WannaCry Ransomware Infection Heat Map

Explained: What is big data?

In our explained series, we talk about the impact of big data to our society. What is it, who uses it, and for what purposes? Categories: Security world Technology Tags: apopheniabig breachesbig ...

Some Dos and Don’ts for Hiring Your Security Leader

I’m an executive-level security headhunter. That means I spend a lot of my week doing two things: talking to CISOs or those people ready to be CISOs and consulting with companies that ...

BSidesLV Preview: Who Watches the Watchers?: Understanding the Internet’s Background Noise

The instant a device is connected to the internet, it gets scanned and interrogated for open ports, software versions, and default passwords. Who conducts these scans and why? When you connect to ...

Disruption: The True Cost of an Industrial Cyber Security Incident

Industrial control systems are essential to the smooth operation of various national critical infrastructure. While once segmented from the web, these systems are now becoming increasingly more networked and remotely accessible as ...

Five Ways to Maximize Opportunity in the Digital Banking Era

Digital transformation presents new opportunities for the financial services industry to expand their offerings and win new customers. With opportunity comes risk, but fraud does not have to be one of them ...

UK Enterprises Concerned Voice-Activated Devices Could Easily Leak Data, Affecting GDPR Compliance

With speech recognition and voice-activated personal assistants slowly making their move into the corporate world, companies will have to adjust their security and digital strategies, infrastructure and customer interactions ...
The Evolving Network Security Environment – Can You Protect Your Customers in a 5G Universe?

The Evolving Network Security Environment – Can You Protect Your Customers in a 5G Universe?

Smart Farming depends on internet of things (IoT) devices and sensors to monitor vast farm fields, guiding farmers’ decisions about crop management through rich data. But it only takes one security flaw ...
Video: Bug Hunting as a Second Income

Video: Bug Hunting as a Second Income

Video and Slide Deck from EH-Net Live! July 2018 When most think of selling bugs, they have visions of the underground hacking scene populated by nefarious characters using their 0-days for illegal ...
Loading...