What if Mother Nature was the CISO? What strategy could she give the prey species so they could survive in the presence of many predators?
Browsing: Phishing
The messages contained a small Trojan downloader that installed the same spy program from the notorious Zeus/Zbot family.
As Mark Kedgley, CTO, NNT asks, why are so many IT security experts intent on looking for footprints in the garden when the front door is wide open?
Following news that a eBay database containing passwords has been compromised after hackers gained access to ‘a small number of employee log-in credentials’
There are many great options to outsource the management and implementation of a security education program to minimize internal time spent on it.
One of the hardest responsibilities to tackle when it comes to fraud management is identifying and anticipating emergent attacks
Smartphones have revolutionized our lives. However, the growth of this technology has also brought privacy and security concerns.
UK office workers have trouble deciding who to trust, however this isn’t surprising considering 14 percent have already been badly affected by cybercrime
The Cyber Security Summit is, sponsored by The Wall Street Journal, connecting Senior Executives responsible for protecting their companies
Foreign intelligence agencies are targeting IT workers at big businesses, hoping to recruit them and gain privileged access to sensitive computer systems.