Sep 21, 2019 | Business, China, College, College, credentials, Cybersecurity Professional, Employees, Future Workforce, Law Enforcement, Legal, Nationstates, Radio Show, Radio_Show, spying, Technology
Chinese Front Organizations on Our Universities Used For Nefarious Purposes It seems as though there are countries that are intent on stealing our intellectual property and technology through fraud, and China appears to be one of the biggest perpetrators. Just this...
Sep 21, 2019 | Applications, Best Practices, Business, cyberattacks, Employees, HR, Malware, Radio Show, Radio_Show, Security, Security
HR The Gateway To Cybercrime Today’s cybercriminals are continually developing new and sophisticated techniques with which to gain access to their victim’s internet technology systems. Currently, over 90% of all cybercrime involves a phishing email....
Sep 7, 2019 | Android, Best Practices, Business, Cell Phone, cell phones, Cybersecurity, Employees, Hacking, Hacking, iPhone, Malware, Patches, Phone, Phones, Radio Show, Radio_Show, Security, Security, Smart Phone, Technology, Updates, Zero-Day
Prices for Zero-Day Attacks – Which commands higher price Apple or Android? For the first time ever, the security exploits broker Zerodium is paying a higher price for zero-day attacks that target Android than it pays for comparable attacks targeting iOS. An...
Aug 31, 2019 | Business, Business Email Compromise, CEO, Cyber breaches, Cybercrime, Employees, Employees, Hackers, Hacking, Hacking, Phishing, Phishing, Radio Show, Radio_Show, Security
Business Email Compromise Group Charged in Bust Eighty people have been charged for their roles in a massive and complex fraud operation that attempted to steal $46 million in business email compromise (BEC) and romance scams, according to the US Department of...
Aug 31, 2019 | Applications, Business, cyberattacks, Cybersecurity, Email, Email, Employees, Employees, Hacking, O365, Phishing, Radio Show, Radio_Show, Technology
The number of Users Makes this Company a Hacking Target One of the biggest players in enterprises is Microsoft and because they are so huge they are a target for phishers because if they can compromise a single user they can get access to your entire O365...
Aug 17, 2019 | Best Practices, Business, Cybercrime, CyberTraining, Employees, Employees, Hackers, Hacking, Hacking, Liability, Malware, Malware, Passwords, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Regulatory Compliance, scam, Security, Security, Technology
Phishing — Best Practices One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...