Look at the threat posed by IRAN to the United States and elsewhere
Quelle: Iran espionage capabilities have a powerful bite
Email is the primary method of attack for almost everything, teach your customers these email security best practices.
Quelle: Email, the primary vector for cyber attacks
The Interpol located and shut down nearly 9,000 Command and control servers located in Asia and hacked with a WordPress plug-in exploit.
Quelle: Cybercrime – Interpol shutdown nearly 9,000 C&C servers in Asia hacked with a WordPress plug exploit
Flashpoint published the paper ‚Cybercrime Economy: An Analysis of Cybercriminal Communication Strategies‘ about cybercriminal communications of bad actors.
Quelle: Anatomy of Cybercriminal Communications: Why do crooks prefer Skype
Insurance agents can help their small-business clients by helping them assess their cyber risks and advising on policies.
Quelle: 10 ways small businesses can fight cyber crime
Building information modeling and computer-aided design are in widespread use, but they also increase the risk of a cyber attack. Here are tips on how architects, engineers and contractors can protect themselves.
Quelle: Cyber crime: How architects, engineers and contractors may be at risk
The cybercrime diaries are a series of blogs that provide CIOs, CSOs, CISOs and IT security teams with bulleted datelines and high-level summary commentary on the most noteworthy cybercriminal activity in a quarterly period.
Quelle: Cybercrime diaries: All the hacks and data breaches in one place