Is someone eavesdropping on your Smart Speaker?

Is someone eavesdropping on your Smart Speaker?

Is someone eavesdropping on your Smart Speaker? Are your smart speakers listening to everything — all the time.  Somewhat. But It turns out that some third-party apps or those don’t natively belong to Google or Amazon may be piggybacking in and eavesdropping. ...
Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’...
Business Email Compromise Group Charged in Bust

Business Email Compromise Group Charged in Bust

Business Email Compromise Group Charged in Bust   Eighty people have been charged for their roles in a massive and complex fraud operation that attempted to steal $46 million in business email compromise (BEC) and romance scams, according to the US Department of...
Phishing — Best Practices

Phishing — Best Practices

Phishing — Best Practices   One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...