Chinese Front Organizations on Our Universities Used For Nefarious Purposes

Chinese Front Organizations on Our Universities Used For Nefarious Purposes

Chinese Front Organizations on Our Universities Used For Nefarious Purposes ​ It seems as though there are countries that are intent on stealing our intellectual property and technology through fraud, and China appears to be one of the biggest perpetrators. Just this...
Prices for Zero Day Attacks – Which commands higher price Apple or Android?

Prices for Zero Day Attacks – Which commands higher price Apple or Android?

Prices for Zero-Day Attacks – Which commands higher price Apple or Android? For the first time ever, the security exploits broker Zerodium is paying a higher price for zero-day attacks that target Android than it pays for comparable attacks targeting iOS. An...
Business Email Compromise Group Charged in Bust

Business Email Compromise Group Charged in Bust

Business Email Compromise Group Charged in Bust   Eighty people have been charged for their roles in a massive and complex fraud operation that attempted to steal $46 million in business email compromise (BEC) and romance scams, according to the US Department of...
Phishing — Best Practices

Phishing — Best Practices

Phishing — Best Practices   One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...