Is Anyone Doing Anything About the Explosion in Crypto Crime? 

As cryptocurrency transactions continue to grow, it’s no surprise that crypto crime has also seen a huge upswing. In 2021, illicit addresses raked in $14 billion, up nearly 80% compared to 2020. Still, the backstories here are even more intriguing. For example, why isn’t crypto crime growth even larger given the rapid adoption of cryptocurrency […]

The post Is Anyone Doing Anything About the Explosion in Crypto Crime?  appeared first on Security Intelligence.

Continue reading Is Anyone Doing Anything About the Explosion in Crypto Crime? 

Why Local Governments Remain at Risk of Cyber Crime

While big-name incidents fill the headlines, local governments and agencies face cyber crime at an alarming rate. In a very direct way, this impacts everyone’s life. The pandemic has forced state and local groups to deploy defenses at a distance over their networks and apps. But local security is often not encrypted and insecure, with […]

The post Why Local Governments Remain at Risk of Cyber Crime appeared first on Security Intelligence.

Continue reading Why Local Governments Remain at Risk of Cyber Crime

Magecart Attacks Continue to ‘Skim’ Software Supply Chains

Did your company or e-commerce firm recently buy third-party software from a value-added reseller (VAR) or systems integrator? Did you vet the vendor code? If not, you could be at risk for a Magecart group attack. Magecart is an association of threat actor groups who target online shopping carts, mostly from within the e-commerce platform […]

The post Magecart Attacks Continue to ‘Skim’ Software Supply Chains appeared first on Security Intelligence.

Continue reading Magecart Attacks Continue to ‘Skim’ Software Supply Chains

Insider Threats: How to Combat Workplace Disinformation

Who hasn’t heard about disinformation or fake news? And for those responsible for security, who hasn’t heard about the risk of insider threats? Both issues are well known, but how disinformation can affect cyber risk management might not be so obvious.  This article won’t tell you who’s right or wrong in a political debate. Instead, […]

The post Insider Threats: How to Combat Workplace Disinformation appeared first on Security Intelligence.

Continue reading Insider Threats: How to Combat Workplace Disinformation

Omnichannel E-commerce Growth Increases API Security Risk

Today, a lot of the digital innovation we see is largely thanks to the application programming interface (API). Without APIs, rapid development would be nearly impossible. After all, the API is the link between computers, software and computer programs. But wherever there’s a link, a potential data security weakness exists.      Essential for modern mobile, SaaS […]

The post Omnichannel E-commerce Growth Increases API Security Risk appeared first on Security Intelligence.

Continue reading Omnichannel E-commerce Growth Increases API Security Risk

Cyber Awareness 2022: Consider Deepfakes, NFTs and More

From deepfakes to crypto crime to in-flight drone-based data theft, cyber awareness in 2022 will look a bit different. Good cyber awareness means knowing these risks, even if some of them sound stranger than science fiction.  Cyber Awareness and Deepfake Crime What if you got a phone call from a trusted friend or colleague to […]

The post Cyber Awareness 2022: Consider Deepfakes, NFTs and More appeared first on Security Intelligence.

Continue reading Cyber Awareness 2022: Consider Deepfakes, NFTs and More

Data Protection: What Needs to Be Protected?

Where is your organization’s data? From global data centers to PCs to mobile apps, data is strewn all over the place. So how do you protect it all?  You can’t encrypt everything, right? It’s too expensive and time-consuming. Even the most stringent regulations don’t demand that level of data protection. For example, GDPR focuses primarily […]

The post Data Protection: What Needs to Be Protected? appeared first on Security Intelligence.

Continue reading Data Protection: What Needs to Be Protected?

One-Time Password Security Might Fail 80% of the Time. IAM is Better

A one-time password (OTP) is an automatically generated sequence of characters that authenticates a user for a single transaction or login session. OTP is a widely popular security strategy, but does it provide true password safety?  This type of password security is certainly better than traditional, static passwords. But recently security analysts discovered that you […]

The post One-Time Password Security Might Fail 80% of the Time. IAM is Better appeared first on Security Intelligence.

Continue reading One-Time Password Security Might Fail 80% of the Time. IAM is Better

7 Holiday Cybersecurity Tips to Try Before The Year Ends

The holiday rush is upon us, and so is the risk of cyberattack. Threat actors often get to work during the holidays. IT staff is heading out for vacation, and everyone is in a hurry. This means we might skimp on security. Still, there are some holiday cybersecurity tips that will help make the season […]

The post 7 Holiday Cybersecurity Tips to Try Before The Year Ends appeared first on Security Intelligence.

Continue reading 7 Holiday Cybersecurity Tips to Try Before The Year Ends

What the Internet Bug Bounty Teaches About Open-Source Software Security

The security platform HackerOne recently announced the latest version of their Internet Bug Bounty (IBB) program. The IBB strives to enhance open-source software security by pooling resources and encouraging security experts (they call themselves hackers) to find flaws in open-source software (OSS).  Now, the program has introduced a new crowd-funding method. This enables more organizations […]

The post What the Internet Bug Bounty Teaches About Open-Source Software Security appeared first on Security Intelligence.

Continue reading What the Internet Bug Bounty Teaches About Open-Source Software Security