article thumbnail

Weekly podcast: Reports galore and more cryptojacking

IT Governance

This week, we discuss new reports from Cisco, McAfee and the CSIS, and Big Brother Watch, and hear more about malicious Monero mining. Cyber security reports are a bit like the proverbial London omnibus: you seem to wait for ages, then several come along at once. Here are this week’s stories. It was a paltry $24.

Mining 66
article thumbnail

Malvertising Campaign Targets IoT Devices: GeoEdge

eSecurity Planet

Simon Aldama, principal security advisor at IT services management company Netenrich, told eSecurity Planet that the risks associated with IoT security currently will get worse before they get better. There are steps enterprises can take to reduce the risk presented by employees working on insecure home networks, Aldama said.

IoT 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: Mumsnet, OkCupid and Apple

IT Governance

Natalie Sawyer, a spokesperson for OkCupid, said: “There has been no security breach at OkCupid. One way of reducing the risk of credential stuffing attacks is to implement two-factor authentication where it’s available. All websites constantly experience account takeover attempts. It’s not available on OkCupid.

article thumbnail

The Quest for Optimal Security

The Falcon's View

However, listing out specific technologies can become cumbersome, plus it doesn't necessarily lend itself well to thinking about security architecture and strategy. For more on my thoughts around org culture, please see my post "Quit Talking About "Security Culture" - Fix Org Culture!". Risk Management.

article thumbnail

CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains

KnowBe4

This latest impersonation campaign makes the case for ensuring users are vigilant when interacting with the web – something accomplished through continual Security Awareness Training. To ensure that you get the most recent security fixes, enable automatic updates whenever possible."

article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

As a business owner, you must be aware of the implications of different types of malware on your company’s bottom line, and what steps you can take to protect your company from future attacks. This article will walk you through the various types of malware, how to identify and prevent a malware attack, and how to mitigate the risks.