How to better protect your organization’s most valuable data

Making Sense of Security

Many organizations underestimate the value of their data to skilled and organized cybercriminals, said security provider eSentire. Keeping up with cybercriminals can be a never-ending challenge for organizations and security professionals. As hackers and attackers come up with increasingly more clever and devious ways to infiltrate an organization, your critical and sensitive data becomes more

An Identity Management Spin on Shaggy’s Hit Song

Wondering how this guy could be so clumsy? So is he. [youtube] Source: Emirates NBD What security-related videos have made you laugh? Let us know! Send them to [email protected]. Beyond the Edge content is curated by Dark Reading editors and created by external sources, credited for their work. View Full Bio View Original Article HERE

Ambitious scam wants far more than just PayPal logins

An ongoing phishing scam uncovered by ESET researchers seeks to wreak havoc on your money and digital life in one fell swoop ESET researchers in Latin America have spotted fraudulent websites that impersonate PayPal and attempt to trick users into handing over considerably more than ‘only’ their access credentials to the payment service. The ruse

Vulnerability Scanning vs. Penetration Testing

It amazes me how many people confuse the importance of vulnerability scanning with penetration testing. Vulnerability scanning cannot replace the importance of penetration testing, and penetration testing, on its own, cannot secure the entire network. Both are important at their respective levels, needed in cyber risk analysis, and are required by standards such as PCI,

FBI, This Week: Skimming Prevention Tips

All it can take is a swipe of your credit or debit card for your personally identifiable information to end up on the dark web. Audio Transcript Mollie Halpern: All it can take is a swipe of your credit or debit card for your personally identifiable information to end up on the dark web. It’s

How to secure your digital Christmas presents

What are some of the key things you should do with your shiny new device as soon as you unbox it? It’s that time of year again, and chances are that new tech will be one of the gifts tucked under your Christmas tree. Whether it’s a smartphone, laptop or, say, an Internet-of-Things (IoT) gadget,

The Five: Ransomware Attacks

The Five: Ransomware Attacks - Making Sense of Security

The Five: Ransomware Attacks Cyber-attacks that threaten to publish a victim’s data or block access to it unless a ransom is paid have grown internationally since 2012. Sodinokibi and Travelex Hackers attacked Travelex’s network on New Year’s Eve, stealing customer data including dates of birth, credit card information, and national insurance numbers. The ransomware gang

Connected cars: How to improve their connection to cybersecurity

With software becoming more important than ever, how can engaging the security industry help make the road ahead less winding? Here at CES, the car manufacturers race to launch the latest gadgets in their new models before the competition. And that’s hard to do without breaking down the software silos. That would mean using widely

FBI, This Week: Holiday Scams

When looking for a good deal this holiday shopping season, the FBI suggests keeping this old adage in mind: If it sounds too good to be true, it probably is. Audio Transcript Mollie Halpern: When looking for a good deal this holiday shopping season, the FBI suggests keeping this old adage in mind…  James Harris, Jr: If it sounds too

How to get rid of your old devices safely

Disposing of old tech isn’t a one-click solution; there are multiple things you have to consider before moving on to greener pastures Black Friday, Cyber Monday and even Christmas are behind us. Which means some of us may have been fortunate enough to unwrap a shiny new laptop, smartphone or tablet. But what about our

20 tips for 2020: Mistakes to avoid

In the first instalment of this two-article series we will be looking at cybersecurity habits to avoid when using your computing devices As we’re entering 2020, we’re also plotting out our New Year’s resolutions. Instead of suggesting what you should do next year, however, let’s have a look at some cybersecurity mistakes you should avoid

20 tips for 2020: Be smarter with your smartphone

In the second blogpost of this two-part series we’ll suggest handy tips to help enhance the security of your mobile devices Yesterday, we discussed bad cybersecurity habits you should avoid in 2020, especially where computers are involved. We’re not done yet. Some of the recommendations apply to both computers and smartphones, such as being especially

Discovering Careers in Cybersecurity

We were excited to celebrate National Cybersecurity Career Awareness Week (NCCAW), November 11-16, 2019. Technology and cybersecurity play a vital role in many facets of our lives. Our growing dependence on the internet and the convenience of technology comes with unique challenges. Attackers are constantly trying to steal sensitive data and cripple systems, such as

3 security tips to protect yourself from skimming attacks

E-commerce sites are trying to keep up with sophisticated skimming schemes, but chances are your credit card information will still be compromised. A security expert offers advice. TechRepublic’s Karen Roby talks with Aanand Krishnan, founder and CEO of Tala Security, about protecting consumers’ identity while shopping online. The following is an edited transcript of their

Get yourself cybersecure for 2020

Technology is changing our lives for the better; yet it’s also exposing us to organised crime, online scammers and hackers – and whole industries built around monetising our personal data. But you don’t have to be resigned to cyber-victimhood. Give yourself, and your devices, a security update for 2020 and start fighting back. Random and

NSA Congratulates Centers of Academic Excellence (CAE)

NSA congratulates Centers of Academic Excellence (CAE)

FORT MEADE, Md., Dec. 13, 2019 — NSA Congratulates Centers of Academic Excellence (CAE) The NSA congratulates these Centers of Academic Excellence as they recognize the following list of academic institutions. The following academic institutions were recognized as designated or re-designated CAE schools at the November 2019 NICE conference: On November 20, 2019, NSA celebrated

FTC Obtains Record $191 Million Settlement from University of Phoenix to Resolve FTC Charges It Used Deceptive Advertising to Attract Prospective Students

The University of Phoenix (UOP) and its parent company, Apollo Education Group, will settle for a record $191 million to resolve Federal Trade Commission charges that they used deceptive advertisements that falsely touted their relationships and job opportunities with companies such as AT&T, Yahoo!, Microsoft, Twitter, and The American Red Cross. Under the settlement unanimously

Hackers Steal $49 million in Cryptocurrency Exchange Upbit Ethereum

South Korean cryptocurrency exchange Upbit today said hackers could steal $49 million in Ethereum. On 27 November, the crypto-coins were moved from Upbeat Ethereum Hot Wallet to an unknown wallet, announced Doo-myeon’s CEO Lee Seok-woo who operates Upbit. In a publication on the Upbit website, the hackers, Seokwoo, disclosed 342,000 ETH (Ethereum), equivalent to approximately

New FBI Wanted App

The FBI has launched a free new mobile app to enlist the public’s help in locating and identifying wanted fugitives, missing persons, and others sought by the Bureau. You’re watching your local news on TV when you see a story on a wanted fugitive in your community. The person looks like someone you’ve seen living

FBI Releases New Bank Robbers Mobile App

The FBI launched a mobile version of its Bank Robbers website to make it easier for smartphone users to view photos and information about bank robberies. Back in December 2012, the FBI launched its Bank Robbers website featuring a gallery of unknown bank robbery suspects wanted by the Bureau. Because the FBI, in its own

FBI Seeking Tech Experts to Become Cyber Special Agents

“One thing that no one else can offer is the mission and the camaraderie and the teamwork the FBI brings to the table,” Anderson said. “Cyber agents will be integrated into all the different violations that we work. So whether it’s a counterterrorism or counterintelligence investigation, they could be the lead agent in the case.”

Protecting Our Children with Technology and Partnerships

Essentially, CETS is a repository that can be filled with records pertaining to child pornography and child exploitation cases. The system can contain images, case information, identities of known offenders along with information about their Internet addresses, and other related material. The program can analyze millions of pornographic images, helping law enforcement personnel avoid duplication

New Tools to Find FBI’s Most Wanted

Not all FBI fugitives are included in the Most Wanted section. Many bank robbers, for example, are publicized through local Bureau press releases or through various state or local websites. See our Bank Robbery webpage for a list of those sites and additional information. Early on, our fugitive posters were commonplace in federal buildings, most