WHO’S WATCHING YOU?

Over the last 10 years, we have witnessed massive changes in the embedded Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), DCS and Physical Security (CCTV, access controls and alarms) sectors, with the adoption of IP-capable technologies through the Internet of Things (IoT) and now the Internet of Everything (IoE). However, the mindset…

3 Cybersecurity Threats SMB Etailers Should Not Ignore

Some small e-commerce website operators may think their relative obscurity offers protection, but the fact is that SMBs are especially vulnerable to cyberattacks and malware. “Very often small businesses don’t feel vulnerable to cyberthreats because they assume cybercriminals prefer to launch attacks on large companies,” said Stephanie Weagle, VP of Corero. “On the contrary, cybercriminals have…

What is Cyber Warfare?

Cyber Warfare Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another nation-state. In these types of attacks, nation-state actors attempt to disrupt the activities of organizations or nation-states, especially for strategic or military purposes and cyberespionage. Although cyberwarfare generally refers to cyberattacks perpetrated by one nation-state on another, it…

The cyber threat is growing

Many of today’s cyber criminals have their sights set on money. And they essentially take three approaches to achieving their goal. They conduct surveillance operations to systematically obtain valuable information from companies, they steal customer and credit-card data, and they blackmail companies by threatening to disrupt their business operations. Research results, for example, can be…

Have You Been a Victim of Social Media Identity Theft?

Tens of millions of fake accounts infest the world’s social media platforms. Is one of those fake accounts impersonating you? In a recent article, The New York Times detailed a global black market in stolen social identities. These stolen identities — names, pictures, hometowns, and other personal information ripped from real peoples’ social media profiles — are…

Six Cyber Threats to Really Worry About in 2018

Hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. The following are some significant threats to look out for this year. More huge data breaches The cyberattack on the Equifax credit reporting agency in 2017, which led to the theft of Social Security numbers, birth dates, and other…