Spearphishing Mobile Devices of Executives

Spearphishing Mobile Devices of Executives

Spearphishing Mobile Devices of Executives   Many businesses today use mobile technology as a primary executive communication channel. However, what happens if these devices are lost or stolen. That often is when they find the executives becoming targets of...
Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’...
Privacy Comes To Largest Installed Browser Base.

Privacy Comes To Largest Installed Browser Base.

Privacy Comes To Largest Installed Browser Base. Mozilla is enhancing the privacy of its US-based Firefox browser applications with a new VPN privacy extension, this week. After downloading, they must sign in to their Firefox account and then click on the...
You Can Buy Anything In This World For Money

You Can Buy Anything In This World For Money

You Can Buy Anything In This World For Money You can buy anything in this world for money — nowhere is this statement truer than on the Dark Web. No matter what a cybercriminal is looking for with money someone in the dark web supply chain which is willing to provide...
Unpatched Firewalls leave US Power Grid Vulnerable to Cyberattacks

Unpatched Firewalls leave US Power Grid Vulnerable to Cyberattacks

Unpatched Firewalls leave US Power Grid Vulnerable to Cyberattacks A cyber-security incident that impacted a US power grid entity earlier this year was not as dangerous as initially thought, the North American Electric Reliability Corporation (NERC) said last week. In...