There are three fundamental elements that must not be overlooked when starting out in corporate security, summarized as the 'ABC of information security'.
Information security could use some good news right now, something to offset the string of bad news about data breaches and system vulnerabilities; so how about this: "Cyber Criminal Forum Taken Down, Members Arrested in 20 Countries".
Support scammers: old twisters, new twists, and scammer psychology.
How homograph attacks can present a spoofed, malicious link, and a case where a secure connection doesn't guarantee a safe site.
There's a lot more to phone scams than tech support, giving rise to an escalating number of complaints. Here's what two recent reports tell us.
Every June, a select group of students from high schools and middle schools in San Diego County, California, get five days of intense education in the art of defending computer systems.
David Harley examines the latest confessions of a support scammer to appear on the web, this time from a Reddit Q&A.
With the deadline for the switchover now just months away, how are vendors doing? Have they begun the conversion already, or will they likely be scrambling at the last minute?
In 2007, David Harley and Andrew Lee suggested at Virus Bulletin that poorly-designed phish quizzes did more harm than good. Has the picture changed much?
Risk analysis is the first step towards managing risks, particularly when it comes to cyber risks. This recorded webinar introduces and explains key concepts, with links to several useful risk assessment tools.
Security research is published in many forms. For example, there are live and recorded webinars that cover a range of cybersecurity topics.
In this recorded webinar the security challenge that mobile devices and BYOD bring to the businesses, notably smaller businesses, is reviewed; then defensive strategies are presented.
Smartphone authentication: is biometric technology ready to replace PINs and passwords?
Beware of that accident scam call or text: losing money isn't the only risk.
Some support scammers and their assassination threats may seem dumb, but they're no joke.They can cause serious damage as we discuss it in this article.
iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.
After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.
Two phone scams of a type that might be new to you: fake surveys asking dangerous questions, and a Londoning scam that seems to target seniors.
The recent opening of the Hacker List portal brings to mind the age-old question: Would you hire a hacker?
Continuing from Consumer Electronics Show 2015 here in Las Vegas where we were covering this week the first impresisions of the show and also some lessons that this digital invasion is leaving us. Now, we will approach another interesting topic that involves privacy and new technology: drones.