Is the IoT the Next Big Threat?

Greg Edwards

The Security of ‘Things’: Is the IoT the Next Big Threat? The CISO of the FBI, Arlette Hart announced in her keynote speech at the IoT Security Conference in Boston last week that the growth of the…

Read More

Jesse James would love Sphinx, Brolux & Dridex

Greg Edwards

Today's bank robbers don't have to worry about getting shot at, where to meet up to split the loot, or a sheriff's possie being hot on their trail. Today's bank robbers really don't have to worry…

Read More

Raytheon Awarded $1 Billion Contract

Jordan Kadlec

The Department of Homeland Security has awarded Raytheon with a $1 billion cybersecurity contract in hopes that they will provide the federal government security against the onslaught of recent…

Read More

Malvertising - You don't even have to click it

Greg Edwards

Malvertising: Malware Infected Online Ads Cybercriminals are always on the lookout for ways of infecting your computer with malware. It is their job, and they do it well. So well in fact, that…

Read More

XcodeGhost - What? an iPhone hack?

Jordan Kadlec

Apple Inc. is currently cleaning up its iOS App Store to eliminate malicious iPhone and iPad programs recognized in the first extensive attack on the popular software outlet. Usually, these types of…

Read More

Stealing Your Money - Sphinx Banking Trojan

Jordan Kadlec

A new banking Trojan called Sphinx has surfaced in the criminal underground. Sphinx is said to be based on the source code of the notorious Zeus banking malware. Zeus, also known as Zbot, is a…

Read More

U.S. Officials Praise Chinese Hackers

Chris Hartwig

Intelligence Officials discuss growing threats of cyberattacks On September 10, 2015 a gathering of the nation’s top intelligence officials convened on Capitol Hill to discuss worldwide cybersecurity…

Read More

The Federal Trade Commission - Enforcing the Next Generation of Cybersecurity

Greg Edwards

The Federal Trade Commission (FTC) has made ground breaking progress in the war on cybercrime, which means the distinction between the real and digital realm is now so fuzzy that the same law can be…

Read More

Next on the Hacker Horizon - Your CAR!

Jordan Kadlec

In what seems to be a never ending cycle, another security threat needs to be brought to the public's attention. This summer, several threats have been posed to the automotive industry. So much so…

Read More
Entrepreneur Link

Share

    

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all