US Department of Justice Warns of COVID-19 Vaccine Survey Scams

US Department of Justice Warns of COVID-19 Vaccine Survey Scams

by Alina Bizga, from HotForSecurity , on 02.04.2021

The US Department of Justice (DoJ) issued a warning on Wednesday about fake COVID-19 vaccine survey scams promising fake prizes or cash payments to recipients. According to reports, consumers have received bogus emails and text messages urging them to provide sensitive information in return for a prize. However, there’s a catch. They need to pay [and#8230;] read more

Kansas Man Could Serve 25 Years in Prison for Hacking Local Water System

Kansas Man Could Serve 25 Years in Prison for Hacking Local Water System

by Filip TRUTA, from HotForSecurity , on 02.04.2021

A 22-year-old Kansas man may face the next quarter century behind bars after allegedly hacking computer systems to affect tap water. A press release from the Department of Justice reveals that Wyatt A. Travnichek, 22, of Ellsworth County, Kansas is charged with one count of tampering with a public water system and one count of [and#8230;] read more

IRS Warns of Phishing Campaign Targeting University Students and Staff

IRS Warns of Phishing Campaign Targeting University Students and Staff

by Alina Bizga, from HotForSecurity , on 01.04.2021

The Internal Revenue Service (IRS) has urged university students and staff to watch out for emails that claim to come from the IRS but seek to steal sensitive personal information. Although IRS impersonation scams are not new, this phishing campaign seems to target individuals in the higher educational system, using and#8220;.eduand#8221;email addresses. According to a [and#8230;] read more

Anti-Exploit Technology is Fundamental for Cloud Workload Security

Anti-Exploit Technology is Fundamental for Cloud Workload Security

by Shaun Donaldson, from Business Insights , on 01.04.2021

All attacks include malicious activity, but not all attacksincludewriting malware todisk Anti-exploit technologyprevents attackers from gaining afoothold What to look for in anti-exploit technology Attacks, exploits andvulnerabilities Anycomplete cloud workload security stackmustfeature robust anti-exploit technology for both end-user and server systems.Cloud workloads run on servers, either on-premises orin the cloud,andend-user systemsaccess those workloads.End-user systems cangiveattackers indirect access to workload data, while serverscan provide more direct access if attackers achieve a foothold. read more

As Advanced Persistent Threats Grow, Businesses of All Sizes Must Prepare

As Advanced Persistent Threats Grow, Businesses of All Sizes Must Prepare

by Steve FIORE, from Business Insights , on 31.03.2021

Advanced Persistent Threats (APTs) are sophisticated, stealthy attacks designed to gain access to an organization’s network systems over a long period of time in order to covertly steal sensitive information or drain financial resources. read more

DoJ Clamps Down on COVID-19 Fraud, Charging Nearly 500 Individuals

DoJ Clamps Down on COVID-19 Fraud, Charging Nearly 500 Individuals

by Alina Bizga, from HotForSecurity , on 31.03.2021

The US Department of Justice (DoJ) has charged nearly 500 individuals for allegedly participating in coronavirus-related scams and fraudulent activities. As of March 26, 474 individuals have been publicly charged with COVID-19 fraud schemes focused on siphoning over $569 million from government financial relief projects, including the Paycheck Protection Program (PPP), Economic Injury Disaster Loan [and#8230;] read more

What You Need to Know to Avoid Instagram Scams

What You Need to Know to Avoid Instagram Scams

by Alina Bizga, from HotForSecurity , on 30.03.2021

Instagram is a big part of the lives of many people, who use it daily to interact with friends and family. The popularity of the social media platform has also ensnared many businesses and individuals who find success in parading out various products, outfits and locations. With over 1 billion active users every month, Instagram [and#8230;] read more

Infosec Community Increasingly Concerned about SolarWinds Breach, Four Months In

Infosec Community Increasingly Concerned about SolarWinds Breach, Four Months In

by Filip TRUTA, from HotForSecurity , on 30.03.2021

The severity of a data breach typically jumps in the short term and decreases as time progresses. But, according to a survey by International Information System Security Certification Consortium, or (ISC)², the 2020 SolarWinds incident bucked that trend in the eyes of cybersecurity professionals. Four months in, the infosec community is more concerned than ever [and#8230;] read more

EDR or MDR: Two Paths to Successful Security Defense

EDR or MDR: Two Paths to Successful Security Defense

by Mia Thompson, from Business Insights , on 29.03.2021

EDR and MDR represent two viable paths to achieving successful security defense Internal teams use EDR tools to launch investigations and guide remediation actions MDR brings professional cross-skilled security analysts and proactive threat hunters Security tipping point is determined by gaps in time, skills, efficiency and outcomes read more

Advanced Encryption will be Key to Future Cyber Security Efforts

Advanced Encryption will be Key to Future Cyber Security Efforts

by Business Insights , on 25.03.2021

Efforts have long been underway to create more advanced cryptography, and the market appears ready to deploy these solutions Promising new approaches include quantum key distribution, biometrics encryption, and homomorphic encryption read more

<< Prev Next >>