2021 Cybersecurity Trends: Bigger Budgets, Endpoint Emphasis and Cloud

Insider threats are redefined in 2021, the work-from-home trend will continue define the threat landscape and mobile endpoints become the attack vector of choice, according 2021 forecasts. Continue reading 2021 Cybersecurity Trends: Bigger Budgets, Endpoint Emphasis and Cloud

Sextortionist Campaign Targets iOS, Android Users with New Spyware

Goontact lures users of illicit sites through Telegram and other secure messaging apps and steals their information for future fraudulent use. Continue reading Sextortionist Campaign Targets iOS, Android Users with New Spyware

Don’t Remove Stalkerware Before Reading This Article

Stalkerware is technically software with malicious intent, but security professionals should treat it as a different beast from other malware. Stalkerware is an app or apps that someone else can install on your device to intercept text messages and phone calls, send call logs, record web browsing activity and keystrokes and even access your location. […]

The post Don’t Remove Stalkerware Before Reading This Article appeared first on Security Intelligence.

Continue reading Don’t Remove Stalkerware Before Reading This Article

Why Zero-Click Cyberthreats Should Be on Your Radar

For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost inevitable from happening. We’ve been convinced that the key to defending against cyberthreats is to keep the unsuspecting from clicking on phishing emails and infecting […]

The post Why Zero-Click Cyberthreats Should Be on Your Radar appeared first on Security Intelligence.

Continue reading Why Zero-Click Cyberthreats Should Be on Your Radar

The Modern Workplace: Keeping Remote Workers Productive and Secure

Results from the March 30, 2020, Gartner CFO Survey indicate that 74% of businesses intend to shift some employees to permanent remote work following their initial experience responding to current global conditions. Regardless of recent world events, many workers already spend time on the job, while physically separated from the corporate campus. Sometimes they will […]

The post The Modern Workplace: Keeping Remote Workers Productive and Secure appeared first on Security Intelligence.

Continue reading The Modern Workplace: Keeping Remote Workers Productive and Secure

What Is Rich Communication Services? Breaking Down the Benefits and Security Risks

Texting has been available since the 1990s, and it has served us well. Now, Rich Communication Services is here. What kinds of security vulnerabilities are associated with this new tech?

The post What Is Rich Communication Services? Breaking Down the Benefits and Security Risks appeared first on Security Intelligence.

Continue reading What Is Rich Communication Services? Breaking Down the Benefits and Security Risks

Artificial Intelligence (AI) and Security: A Match Made in the SOC

When security analysts partner with artificial intelligence, the benefits include increased productivity, improved job satisfaction, and streamlined threat detection, investigation and response.

The post Artificial Intelligence (AI) and Security: A Match Made in the SOC appeared first on Security Intelligence.

Continue reading Artificial Intelligence (AI) and Security: A Match Made in the SOC

Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know

Whether you’re the CEO of a multinational corporation or a college kid setting up a Gmail account, proper cybersecurity hygiene should be as essential as understanding the rules of the road.

The post Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know appeared first on Security Intelligence.

Continue reading Are You Smarter Than a Jeopardy GOAT? 5 Cybersecurity Topics to Know

Is Juice Jacking a Legitimate Threat or Nothing to Worry About?

Juice jacking is either a rare or currently unpracticed attack that’s brimming with potential for cybercriminals and spies.

The post Is Juice Jacking a Legitimate Threat or Nothing to Worry About? appeared first on Security Intelligence.

Continue reading Is Juice Jacking a Legitimate Threat or Nothing to Worry About?