What Is Cyberespionage? Tactics, Targets, and Prevention TipsEspionage is not something new. But over the years we have moved on from globe-trotting secret agents, dust coats,...
Day: October 27, 2022
What Is Smishing? Here’s How to Spot Fake Texts and Keep Your Info Safe
What Is Smishing? Here’s How to Spot Fake Texts and Keep Your Info Safe Your phone buzzes. You hope it’s a reply from last night’s date,...
Launching a Vulnerability Management Program
Launching a Vulnerability Management ProgramLaunching a vulnerability management program requires a few methodical steps When President Biden’s executive order shone a light on the need to...
Optimize and secure your team’s Apple devices with Jamf Now
Optimize and secure your team’s Apple devices with Jamf NowLearn how Jamf Now’s features can streamline your company’s Apple mobile device management. The post Optimize and...
57 Million Users Compromised in Uber Leak: Protect Your Digital Privacy and Identity
57 Million Users Compromised in Uber Leak: Protect Your Digital Privacy and Identity “I’ll just Uber home.” Who hails a taxi anymore? These days, city streets...
Digital Estate Planning – What to Do With Your Digital Assets
Digital Estate Planning – What to Do With Your Digital Assets While we’re enjoying the fruits of digital life—our eBooks, movies, email accounts, social media profiles,...
What Is Personally Identifiable Information (PII)?
What Is Personally Identifiable Information (PII)?Contenido de la entradaLeer másProofpoint News Feed
Australian Insurer Medibank Confirms Ransomware Attack [Updated]
Australian Insurer Medibank Confirms Ransomware Attack [Updated]Medibank, a health insurance company providing services for more than 3.9 million people in Australia, recently confirmed that a ransomware...
What is Spyware?
What is Spyware? No one likes the feeling that someone is looking over their shoulder when they work, shop or surf online. But this is just...
True Security Requires a Holistic Approach
True Security Requires a Holistic Approach In the eyes of hackers, scammers, and thieves, your online privacy and identity look like a giant jigsaw puzzle. One...
What We Have Learnt Building a Global Security Conscious Culture
What We Have Learnt Building a Global Security Conscious CultureBy Nicola McCoy, Chief Information Security Officer at RSM International The growing cyber risk is impacting global...
Parcel delivery scams are on the rise: Do you know what to watch out for?
Parcel delivery scams are on the rise: Do you know what to watch out for?As package delivery scams that spoof DHL, USPS and other delivery companies...
South Korean Android Users Targeted by Three New Malware Strains
South Korean Android Users Targeted by Three New Malware StrainsThe North Korean cyberespionage group known as Kimsuky has been observed exploiting three different Android malware targeted...
Cybercriminals Continue to Set Their Sights on Hospitality
Cybercriminals Continue to Set Their Sights on HospitalityContenido de la entradaLeer másProofpoint News Feed
Get practice materials for 14 top certification exams for just $20
Get practice materials for 14 top certification exams for just $20Cover CompTIA, AWS and much more with The 2022 CompTIA & AWS Practice Exam E-Book Bundle....
Toyota Data Breach Exposes Customer Data – What You Can Do to Protect Yourself
Toyota Data Breach Exposes Customer Data – What You Can Do to Protect Yourself Automobile manufacturer Toyota recently announced a data breach that may have exposed...
Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication
Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled PublicationContenido de la entradaLeer másCisco Event Responses
New Malicious Clicker found in apps installed by 20M+ users
New Malicious Clicker found in apps installed by 20M+ users Authored by SangRyol Ryu Cybercriminals are always after illegal advertising revenue. As we have previously reported,...
Massive Freejacking Campaign Abuses Cloud Dev Resources
Massive Freejacking Campaign Abuses Cloud Dev ResourcesA large-scale freejacking campaign is abusing GitHub, Heroku, and Buddy services to mine cryptocurrency at the expense of the provider....
“This Connection Is Not Private” – What it Means and How to Protect Your Privacy
“This Connection Is Not Private” – What it Means and How to Protect Your Privacy Have you ever been browsing online and clicked a link or...
How to Tell Whether a Website Is Safe or Unsafe
How to Tell Whether a Website Is Safe or Unsafe It’s important to know that not all websites are safe to visit. In fact, some sites...
Big Changes are Afoot: Expanding and Enhancing the Have I Been Pwned API
Big Changes are Afoot: Expanding and Enhancing the Have I Been Pwned APIJust over 3 years ago now, I sat down at a makeshift desk (ok,...
The U.K. Company Interserve Fined for Lack of Cybersecurity Measures
The U.K. Company Interserve Fined for Lack of Cybersecurity MeasuresConstruction group Interserve was fined by the UK’s Information Commissioner’s Office (ICO) after a cyberattack that happened...
The not-so-Charming Kitten working for Iran
The not-so-Charming Kitten working for IranContenido de la entradaLeer másProofpoint News Feed
Secure corporate emails with intent-based BEC detection
Secure corporate emails with intent-based BEC detectionBusiness email compromise is a severe threat that might affect any company. One promising way to improve detection on this...
Guide: Protecting Your Digital Identity
Guide: Protecting Your Digital Identity People in their 20s and 30s are losing it online. And by it, I mean money—thanks to digital identity theft. In its simplest...
What Are Tailgating Attacks and How to Protect Yourself From Them
What Are Tailgating Attacks and How to Protect Yourself From Them Whether you’re spending time on the web or working in the office, you want peace...
What Is Smishing and Vishing, and How Do You Protect Yourself
What Is Smishing and Vishing, and How Do You Protect Yourself Smishing and vishing are scams where criminals attempt to get users to click a fraudulent...
How to Spot Fake Login Pages
How to Spot Fake Login Pages Have you ever come across a website that just didn’t look quite right? Perhaps the company logo looked slightly misshapen, or the...
Top Signs of Identity Theft
Top Signs of Identity Theft When it comes to identity theft, trust your gut when something doesn’t feel right. Follow up. What you’re seeing could be a problem. A missing bill or a mysterious charge on your...