• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos4 Stats

10 Facts About Today's Cybersecurity Landscape That You Should Know

The cybersecurity landscape is constantly evolving with new threats and never-before-seen vulnerabilities being discovered by security experts and, just as likely, exploited by cybercriminals at a fast pace. Breaking news alerts of widespread data breaches or high-profile hacks serve as reminders of the need for security online, but the flood of information can also be overwhelming. Let this cut through the clutter - Here are 10 facts you need to know about today's cybersecurity landscape:   1: Cybercriminals are using more zero-day vulnerabilities than ever before. A new zero-day vuln...
Read More
Kudos0

Cybersecurity Trends and How-to Protect Your Business

Information security is more important than ever when it comes to safeguarding small business. According to the Symantec Internet Security Threat Report a noteworthy 30% of all spear-phishing attacks were aimed at small businesses in 2013, while one in five small businesses received at least one targeted spear-phishing email. In 2014, we identified a few technology trends that will have a direct impact on small businesses and the way they protect business critical information. All eyes will be on protecting Privacy From scary headline news to a much-needed wake-up call, consumers and sma...
Read More
Kudos2 Stats

How a Gmail Password Stealing Scam Works

Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you need to know to protect yourself from this email password stealing scam. Who is affected? Symantec researchers have found this scam largely targets Gmail, Hotmail, and Yahoo Mail users. However, everyone with an email account should be aware of how this scam works to avoid falling victim. See how the scam works. In just a few quick steps, cybercriminals trick victims into disclosing email ...
Read More
Kudos2 Stats

Is Your Identity Exposed? Tips to Secure Your Identity Online

Did you know that 429 million identities were exposed in 2015? Findings from the 2016 Symantec Internet Security Threat Report show that this number actually hides a bigger story. While there was a record number of 9 mega breaches in this year, companies are not required to disclose the full extent of a data breach. The total number of people affected by a data breach and whose identity is compromised as a result could be much greater. A conservative estimate by Symantec accounting for unreported breaches pushes the number of records lost in a data breach to more than a half billion, in ...
Read More
Kudos2 Stats

Russian Hackers Collect 1.2 Billion Passwords In A Mega Breach

The New York Times has reported the largest known collection of stolen Internet credentials by a Russian crime ring. These hackers reportedly amassed 1.2 billion username and password combinations, and more than 500 million email addresses from 420,000 websites through botnets (computers that have been infected with and controlled by a computer virus). The sites ranged from small sites to larger household names. Many of the targeted sites are still vulnerable. 2014: The Year Of The Mega, MEGA Breach? In Symantec’s 2014 Internet Security Threat Report, researchers declared 2013 as “The Ye...
Read More
Kudos5 Stats

The Smarter Home: How to Create a Smart Home

Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected things. However, convenience does not come without risk. One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. Let’s take a look at how-to create a smart home while following cybersecurity best practices. What Is a Smart Home? While the term “Smart Home” has been used a lot these days, especially with the rapid emergence of ...
Read More
Kudos2 Stats

What is Cyber Espionage?

When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional character, old school spies like that do exist. However, with the advancement of all of our data becoming digitized, we’re quickly becoming introduced to the new school version of spies- cyber spies. New school espionage simplifies the spying process extremely. Companies and institutions store almost an overabundance of data in their systems. I...
Read More