More Than Three-Quarters of US Businesses Are CyberAtttack Targets

More Than Three-Quarters of US Businesses Are CyberAtttack Targets

More Than Three-Quarters of US Businesses Are CyberAtttack Targets   Cybersecurity incidents are up! Hackers worldwide favorite target du jour are U.S. small and medium-sized businesses. Unfortunately, for many, they have fallen back on the false idea they are...
Popular Game Breaches Personally Identifiable Information of 218 Million People

Popular Game Breaches Personally Identifiable Information of 218 Million People

Popular Game Breaches Personally Identifiable Information of 218 Million People   Do you like to play games on your smartphone or tablet? Word games, crosswords, and word searches and other social brain challenge games are quite popular but none so much as Words...
Audit Logs May Help You Make Your Case — If You Have Them

Audit Logs May Help You Make Your Case — If You Have Them

Audit Logs May Help You Make Your Case — If You Have Them   Most businesses today are fielding malicious attacks on a daily and sometimes hourly basis. Do you keep audit logs of the activity on your computer system? Logs can act as a red flag to identify when...
Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’...
You Can Buy Anything In This World For Money

You Can Buy Anything In This World For Money

You Can Buy Anything In This World For Money You can buy anything in this world for money — nowhere is this statement truer than on the Dark Web. No matter what a cybercriminal is looking for with money someone in the dark web supply chain which is willing to provide...