Three BIG security threat predictions for 2016: Make sure you are covered!

Posted by:

With many security companies pushing out their threat predictions for 2016, we thought it best to review as many as we could in order to compile a definitive list of what to look out for in this coming year.

And, as independent consultants without any direct or indirect ties to specific security providers, we are well placed to provide an product-agnostic perspective on the state of security in 2016.

More importantly, we wanted to give you expert advice on how you can ...

Read More →
0

Hackers Steal Trading Algorithms From Hedge Funds

Posted by:

Read More →
0

SEC Publishes Cybersecurity Exam Results – Infographic

Posted by:

The Office of Compliance Inspections and Examinations (OCIE) National Examination Program staff, recently examined 57 registered broker-dealers and 49 registered investment advisers to better understand how broker-dealers and advisers address the legal, regulatory, and compliance issues associated with
cybersecurity (the “Cybersecurity Examination Initiative” or the “Initiative”).

In the examinations, the staff collected and analyzed information from the selected firms relating to their practices for: identifying risks related to cybersecurity; establishing cybersecurity governance, including policies, procedures, and oversight processes; protecting firm networks ...

Read More →
0

SEC Could Pressure Companies To Tighten CyberSecurity

Posted by:

SEC data breach reportingThe Securities and Exchange Commission is advancing measures that would require publicly owned companies to disclose more information about their cybersecurity vulnerabilities, including data breaches.

The requirements could put pressure on companies to tighten their own security, because the SEC rules would let the public know how well firms are securing their private information.

On Tuesday, the White House launched a new ...

Read More →
0

10 Things You Probably Didn’t Know About Identity Theft

Posted by:

Misunderstanding Abounds

Identity theft has become one of the biggest concerns for Americans. However, it is also one of the most misunderstood subjects among consumers. We are always looking for ways to protect ourselves from fraud. Credit card fraud or identity theft can turn your life upside down, especially if you have to spend time with law enforcement or incur legal charges. Its always best to prevent identity theft instead of trying to fix problems ...

Read More →
0

8 Numbers Identity Thieves Want to Steal From You

Posted by:

identity theft

Know What To Protect

If you haven’t had your identity stolen or compromised yet, just wait…… It’s only a matter of time until it happens to you unless you know what you’re protecting.

The Star Wars Cantina of cybercriminals targeting your identity, healthcare, finances and privacy today might seem like a movie you’ve seen so many times you could lip sync the entire thing. Nevertheless, cybercrime and identity-related scams change ...

Read More →
0

WordPress Cookie Flaw Lets Hackers Hijack Your Account

Posted by:

woodpress cookie flaw

WordPress Users Beware!

Do you own a blog on WordPress.com website? If so, then you should take extra care while signing into your WordPress account when connected to public Wi-Fi, because it can be hacked without your knowledge, even if you have enabled two-factor authentication.

Yan Zhu, a researcher at the Electronic Frontier Foundation (EFF) noticed that the blogs hosted on WordPress are ...

Read More →
0

The History Of Hacking – Timeline Of Hacking Techniques [Infographic]

Posted by:

cyber security - hacker preventionIf you think hackers get a bad rap, think about this……

The word “hacking” has become synonymous with ill doings and the amount of affected people might be the reason for that. The meanings of hacking are many and most are intended to describe the act of engaging in activities (such as programming or other media) ...

Read More →
0

Enterprise Penetration Testing In The Palm Of Your Hand

Posted by:

Pwnie Express Unveils Next Generation State-of-the-Art Pwn Phone 2014.

pwn phone penetration testingEarlier this week, Pwnie Express revealed the next generation of its  game-changing Pwn Phone, a cutting edge sleek phone that doubles as a powerful penetration testing device making it incredibly easy to evaluate wired, wireless and Bluetooth networks.

The leader in vulnerability assessment and penetration testing devices, the Pwn Phone 2014 is ...

Read More →
0

Microsoft Releases Patch For Zero Day Vulnerability (CVE-2014-1776) Including Patch For XP

Posted by:

LATEST INTERNET EXPLORER ZERO-DAY VULNERABILITY (CVE-2014-1776)IS IT SAFE YET?

Microsoft released a security update for its Internet Explorer browser Thursday to fix a the Zero-Day Vulnerability (CVE 2014-1776) for all versions of Windows including XP. This security update is rated Critical for Internet Explorer 6 (IE 6) thru 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6) thru Internet Explorer 11 (IE 11) on affected Windows ...

Read More →
0
Page 5 of 6 «...23456
})
SEC Cybersecurity Exams