As well as fans, the World Cup attracted cybercriminals interested in the payment details of football enthusiasts
Browsing: Phishing
Jaime Blasco, Director of AlienVault Labs, has discovered that Microsoft’s Internet Explorer browser is being exploited by hackers and cyber criminals.
With a few common-sense communication steps, organizations that implement employee monitoring can actually bolster and maintain employee goodwill.
In June of 2014, a group of hackers accessed and downloaded the personal information of over 600,000 French and Belgian Dominos customers.
Over the past five years, the threat of hacktivism, as embodied in different #ops, has grown exponentially in the Middle East.
The new vulnerability archive XSSposed recently reported its first month results on Twitter @xssposed – 1,087 vulnerabilities on 692 vulnerable websites.
Ong Yew Chuan reviews Twitter bots, including the different types and how they’re used today.
TECHEXPO has announced the agenda for its New York City Cyber Security Summit set to take place on Thursday, September 18, 2014.
Infosec expert Raj Samani honors the unsung heroes that are working so hard to make our digital lives safer and more secure.
Scott Goldman, authentication expert and CEO of TextPower, comments on common attacks against mobile apps.