Sep 7, 2019 | Applications, Big Tech, Business, Cloud, Cloud Vendors, Computers, Cybersecurity, Data, data sharing, Data Storage, Hacking, Malware, Radio Show, Radio_Show, Security, Security, Software As A Service, Technology
Cloud Services Have a Dark Side When It Comes To Security More than half of firms running multicloud environments have been hit with a data breach in the past year, compared with 24% of hybrid cloud organizations and 24% of single-cloud users. To gain a better...
Sep 7, 2019 | Business, CEO, Cybercrime, DeepFake, Hackers, Hacking, Phone, Radio Show, Radio_Show, Security, Security
Can your CEO’s Voice be Faked? How would you know? Fraudsters are constantly looking for new ways to scam their victims. One unique case gives the security industry a glimpse of what they could do with artificial intelligence (AI) and voice recording. As part of an...
Aug 31, 2019 | Business, Business Email Compromise, CEO, Cyber breaches, Cybercrime, Employees, Employees, Hackers, Hacking, Hacking, Phishing, Phishing, Radio Show, Radio_Show, Security
Business Email Compromise Group Charged in Bust Eighty people have been charged for their roles in a massive and complex fraud operation that attempted to steal $46 million in business email compromise (BEC) and romance scams, according to the US Department of...
Aug 31, 2019 | Best Practices, Business, Computers, cyberattacks, Cybercrime, Hackers, Hacking, Infosec, IoT, Nationstates, Radio Show, Radio_Show, Russia, Security
Unsecured IoT is a Playground for Hackers Playground Microsoft made news recently at the annual Black Hat conference in Las Vegas, generating a lot of buzz about its discovery of a malicious Russian hacker group using some common Internet of Things (IoT)...
Aug 24, 2019 | Business, credentials, Cyber breaches, Cybercrime, Cybersecurity, Hacking, Hacking, Passwords, Radio Show, Radio_Show, Security, Technology
Your Login Credentials are Keys to the Kingdom for Hackers A recent study published by Google estimates that 1.5% of all login credentials used across the web have been compromised in data breaches and are vulnerable to credential stuffing attacks. Google has...