May 2, 2020 | Agencies, Banking, Banking, Biological Viruses, Business, communication, Consumer, CoronaVirus, Coronavirus, Covid-19, Cyber breaches, Cybercrime, Cybersecurity, Financial, fraudster, Government, Hackers, Internet, News, Phishing, Phishing, Quarantine, Radio Show, Radio_Show, scam, Security, Smishing, Technology, Vishing
Who Is Falling for COVID-19 Scams…Lots of People Hackers are spreading their scams widely in the face of the COVID-19 pandemic, and unfortunately, tricking many people into clicking on these fraudulent spam offers. Having been sequestered in our homes and feel...
Apr 28, 2020 | Business, Computers, Consumer, Cyber breaches, Cybercrime, Features, Hackers, iHeart, Internet, Public, Security, Technology, Vishing
Secure Use of Computers in Public Hi. Craig Peterson here with a blink into using computers in public. Most people have their own computers nowadays, but we are using them more-and-more in public. We are plugging our devices into random USB ports to charge them....
Apr 4, 2020 | Anti-Virus, Applications, Attack Vectors, Audit Logs, Business, Cloud, Compliance, compromised machines, Critical data, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Firewalls, Hackers, Hacking, Hacking, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Legacy Systems, Malware, Monitoring, Nationstates, Networking, Organized Crime, Patching, Phishing, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Routers, Security, Security Alerts, Smishing, Surveillance, Technology, Technology, trojans, Updates, Vishing, VPN
How to Evict Attackers Living Off Your Land Why invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you?...
Apr 4, 2020 | Agencies, Business, Business Email Compromise, Censorship, China, Cyber breaches, Cybercrime, Cybersecurity, DOJ, Economic Disruption, FBI, Fines and Penalties, FTC, Government, Hackers, Hacking, Hacking, Hacks, Internet, Internet Service Providers, IoT, Iran, Journalists, Law Enforcement, Malware, Malware, Monitoring, Nationstates, North Korea, Patching, Phishing, Radio Show, Radio_Show, Regulation, Security, Security Alerts, Smishing, Social Engineering, Surveillance, Technology, Technology, Third - Party, third-world, Threat Analysis, trojans, Updates, Vishing, Web Tools, Zero-Day
Google sent users 40,000 warnings of nation-state hack attacks in 2019 Google’s threat analysis group, which counters targeted and government-backed hacking against the company and its users, sent account holders almost 40,000 warnings in 2019, with government...
Feb 15, 2020 | Access Controls, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, Business, Business Email Compromise, China, Cloud, Cloud Vendors, Compliance, Corporate Reputation, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Storage, Economic Disruption, Employees, Executives, Extortion, Government, Hackers, Hacking, Intellectual Property Theft, Internet, Intricate Data Systems, Legacy Systems, Malware, Managed Services Provider (MSP), Market Value, Nationstates, News, Patching, Phishing, Policies and Procedures, Radio Show, Regulatory Compliance, Security, Security Alerts, Smishing, Social Engineering, Technology, Third - Party, third-world, Updates, Vishing
Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government. They target military sub-contractors and sub-sub-contractors, universities,...
Jan 18, 2020 | Business, Cyber breaches, Cybercrime, Cybersecurity, CyberTraining, Data Assets, Employees, Employment, Human Element, Identity Theft, Insider Threat, Internet, Passwords, Phishing, Phishing, Privacy, Radio Show, Radio_Show, Security, Smishing, Technology, Vishing, Vulnerabilities
Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...