Please turn on your JavaScript for this page to function normally.
No money mule, no problem: Recruitment website kits for sale

A valuable asset in the fraud world, money mules enable cybercriminals to cash out stolen money. After cybercriminals take over a victim’s account, they enlist the help …

Can mobile devices be more secure than PCs?

Mobile devices continue to fight an inaccurate perception that they’re not as secure as traditional PCs. Entrust believes that mobile devices, when properly managed and …

Car and electronics shoppers at risk of escrow fraud

Cars, motorbikes and electronics top the list of items that scammers use most to swindle online shoppers in the growing underworld of escrow fraud, according to our recent …

Open source NAC PacketFence 4.0 released

PacketFence is a fully supported, trusted, free and open source NAC solution. Among the features provided by PacketFence, there are: BYOD workflows Guests management Multiple …

Week in review: Malware you can “live with”, but should’t, and backdoor targeting popular web servers

Here’s an overview of some of last week’s most interesting news, videos, interviews, reviews and articles: Malware you can “live with”, but …

Eight indicted in $45M cybercrime campaign

A four-count federal indictment was unsealed in Brooklyn charging eight defendants with participating in two worldwide cyberattacks that inflicted $45 million in losses on the …

Bringing networking and security together through network automation

The past ten years have seen a proliferation of increasingly complex network devices. Coupled with the recent rise in adoption of BYOD policies, mobile working practices, …

Microsoft to release 10 bulletins

It is the week before Patch Tuesday May and Microsoft has published its Advance Notification, giving us insight into what to expect next Tuesday. There will be 10 bulletins …

Phishers taking over accounts of telecommunication customers

The Internet Crime Complaint Center has received numerous reports of phishing attacks targeting various telecommunication companies’ customers. Individuals receive …

Healthcare leaders streamline third party assessment process

Recent breach data clearly indicates that third party business partners pose significant risk of data loss to a healthcare organization, often requiring public notification …

Organizations failing to secure primary attack target

Despite repeated warnings, a majority of organizations are failing to enact recommended best practice security policies around one of the primary targets of advanced attacks …

IT executives believe the cloud increases data security

While companies have become increasingly comfortable with the security of third-party cloud service providers, data security – particularly at the end user level – …

Don't miss

Cybersecurity news