Shopper’s Lawsuit Seeks $5M in Damages for Data Breach at Saks Fifth Avenue, Lord & Taylor

Shopper’s Lawsuit Seeks $5M in Damages for Data Breach at Saks Fifth Avenue, Lord & Taylor

A shopper has filed a class-action lawsuit seeking at least $5 million in damages for a data breach that affected Saks Fifth Avenue and Lord & Taylor. According to Women’s Wear Daily, ...
Singles’ Day deal seekers beware

Singles’ Day deal seekers beware

Originally a day set aside for singles in China to be proud of their singlehood, Singles’ Day has been transformed into what is arguably the world’s single largest e-commerce festival, thanks to ...
Disdain exploit kit served with a side of social engineering

Disdain exploit kit served with a side of social engineering

Exploits may not be enough as threat actors combine them with social engineering in a new Disdain exploit kit attack method. Categories: Exploits Threat analysis Tags: DisdainEKexploit kitneutrino (Read more...) The post ...
4 Ways Rate Limiting is Losing You Business

4 Ways Rate Limiting is Losing You Business

Using rate limiting for website protection has significant drawbacks when it comes to your business. Here are four ways rate limiting is costing you money, and what you can do about it ...
Puppy scammer tries a hard sell

Of scammers and cute puppies

We take a look at a cute puppy scam, in which criminals seek money for adorable dogs that don't exist. Categories: Cybercrime Social engineering Tags: advance fee fraudmoney mulescam (Read more...) The ...
Is Your DDoS Cloud Signaling Just Blowing Smoke?

Is Your DDoS Cloud Signaling Just Blowing Smoke?

Many DDoS vendors claim to have cloud ‘signaling’ capabilities between on-prem detection and cloud scrubbing centers. In practice, many of these marketing claims only pay a lip-service to true hybrid signaling. These ...
Bridging the Cyber Security Skills Gap

Bridging the Cyber Security Skills Gap

The following is a Q&A with Ron Winward. Ron is a Security Evangelist for Radware, where he helps execute the company’s thought leadership on today’s security threat landscape. Ron brings nearly 20 ...
A look into the global drive-by cryptocurrency mining phenomenon

A look into the global drive-by cryptocurrency mining phenomenon

As drive-by downloads slow down, drive-by cryptocurrency mining emerges as the latest annoyance that hijacks our PCs' CPU. Categories: Cybercrime Exploits Privacy Tags: coinhivecryptocurrenciesCryptojackingDrive-by miningJsMinermonero (Read more...) The post A look into ...
Whither Cash?

Whither Cash?

With every big data breach, news reports highlight consumers swearing they’ll never use their credit cards again. Of course they’re soon back at it: for most folks, paying for everything using cash ...
Stay away from the Bitcoin multiplier scam

Stay away from the Bitcoin multiplier scam

Bitcoin multiplier scams: same old scam, different commodity. Scammers want your Bitcoins, and to get them, they promise to make you rich in less than an hour. Too good to be true? ...
Loading...