CyberSecurity
-
Cryptocurrency: Why Criminals Are Now Focusing Their Attacks on Bitcoin, ICOs, And Many Alt-Cryptos
February 2, 2018Over the past month, criminals have successfully stolen significant amounts of cryptocurrency, making international news headlines...
-
Google Removed 700,000 Problematic Apps From Its Android Play Store in 2017
February 1, 2018In 2017 alone, Google blocked over 700,000 problematic Android apps from being available to users via...
-
Hacker Steals $150,000 From Cryptocurrency ICO Participants Via Breach And Phishing Attack
January 29, 2018A criminal has apparently successfully stolen about $150,000 by tricking people participating in the cryptocurrency, Experty, ICO pre-sale...
-
Will GDPR Kill Unsuspecting Businesses?
January 23, 2018The new data protection rules known as General Data Protection Regulation – or GDPR for short...
-
7 Types of Ransomware That You Need To Know About
January 18, 2018In a post last week, I described ten reasons why ransomware – that is, computer malware...
-
New ‘AdultSwine’ Malware Displays Adult Images To Children
January 16, 2018Malware that displays graphic, adult images has been found in multiple Android apps targeting children. The...
-
Ransomware: Why It Will Cause Even More Damage and Destruction in 2018
January 9, 2018Ransomware – that is, computer malware that prevents users from accessing their files until they pay...
-
Technology Firms–and Users–Scramble to Address Major Security Flaws Found in Nearly All Computers and Phones
January 4, 2018Here is what you need to know to protect yourself against 2 serious security vulnerabilities found...
-
Why Defense In Depth Is Not Good Enough
December 18, 2017For many years, information security professionals have discussed, and promoted, a strategy known as “Defense In...
-
How Artificial Intelligence Is Transforming Background Checks
December 15, 2017In today’s world, performing background checks before hiring an employee has become the standard operating procedure...