For Caught in the Crossfire of Cyberwarfare

Authored by Dr Sandra Bell, Head of Resilience Consulting EMEA, Sungard Availability Services 
PDF edition of this article

The 2019 National Cyber Security Centre’s (NCSC) Annual Review does not shy away from naming the four key protagonist… Continue reading For Caught in the Crossfire of Cyberwarfare

Aventura Charged With Selling Chinese-Made Security Equipment

Aventura Technologies and seven of its executives have been charged with illegally importing Chinese-made security and surveillance equipment and claiming it to be made in the United States. The company, based in Commack, New York, claimed its securit… Continue reading Aventura Charged With Selling Chinese-Made Security Equipment

Twitter and the Saudi Computer Crime – Or Was It?

What the two Twitter employees’ actions in accessing user data for use by the Saudi Kingdom was not technically a criminal offense On Nov. 7, the United States Department of Justice (DoJ) charged two individuals, one a U.S. citizen the other a c… Continue reading Twitter and the Saudi Computer Crime – Or Was It?

Giving Thanks & Looking Forward to 2020

As you prepare for a new year, it?s time to reflect on mistakes and learn from the past.
The post Giving Thanks & Looking Forward to 2020 appeared first on Security Boulevard.
Continue reading Giving Thanks & Looking Forward to 2020

Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

It is customary to begin an article on cybersecurity with some statement about the exponential growth of threats, attacks, vulnerabilities, etc. I’m no different. It seems like a reasonable, generally accepted thing to do. So, I was somewhat surp… Continue reading Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

It is customary to begin an article on cybersecurity with some statement about the exponential growth of threats, attacks, vulnerabilities, etc. I’m no different. It seems like a reasonable, generally accepted thing to do. So, I was somewhat surp… Continue reading Are Cybersecurity Intelligence and Security Metrics Statistically Significant?

Five Emails you don’t want in your Inbox

Phishing attacks are the most common form of cyber attack. Why? The simplicity of email gives cybercriminals an easy route in, allowing them to reach users directly with no defensive barriers, to mislead, harvest credentials and spread malicious elemen… Continue reading Five Emails you don’t want in your Inbox

Saudi Arabia Paid Twitter Staff to Spy on Dissidents, Alleges DoJ

Justice Dept. says ex-employees of Twitter were paid by Saudi Arabia to steal user data. Targets might have included assassinated journalist Jamal Khashoggi.
The post Saudi Arabia Paid Twitter Staff to Spy on Dissidents, Alleges DoJ appeared first on … Continue reading Saudi Arabia Paid Twitter Staff to Spy on Dissidents, Alleges DoJ

Spear phishing is now the main attack vector for cybercriminals, says Europol

Spear phishing is the number one cyber-threat to organizations in the European Union, according to the European Cybercrime Centre (EC3), a group of cybersecurity experts set up by Europol to help fight cybercrime. The finding is highlighted in the EC3&… Continue reading Spear phishing is now the main attack vector for cybercriminals, says Europol

FTC Enforcement Action May Open Way for Punishment of Hacker Tools

An FTC suit against a software developer may open the door for prosecution of hacker tools On Oct. 22, the U.S. Federal Trade Commission (FTC) settled an enforcement action against a software developer because its software could be used by users for p… Continue reading FTC Enforcement Action May Open Way for Punishment of Hacker Tools