article thumbnail

Ethical Hackers: A Business’s Best Friend?

Thales Cloud Protection & Licensing

Originally published in Forbes on July 29, 2019. The four key methods of an ethical hacker include: Monitoring: They’ll monitor a company to understand the data it creates and stores and where any sensitive data is — the gold mine hackers are after. Diving: Ethical hackers will also go dumpster diving (i.e.,

Cloud 91
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

Rather than dropping ransomware on victims’ machines and hoping they would pay to regain access to their files, cyber criminals were increasingly cutting out the middle man and infecting victims’ machines with software that used their spare processing power to mine for cryptocurrency. Here’s hoping we all fare better in 2019.

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

You just knew 2022 was going to be The Year of Crypto Grift when two of the world’s most popular antivirus makers — Norton and Avira — kicked things off by installing cryptocurrency mining programs on customer computers.

Passwords 233