Be aware that there are a number of concerted attacks occurring now through a technique called “spear phishing”. This occurs when someone sends an e-mail that looks like a legitimate communication from someone who seems to be a real person, but it’s not. See the link here to get a good definition and some examples of spear phishing attacks. Never believe that you are not noticeable to someone who might want to target you. Always question any e-mail that you receive. If you don’t recognize the link to something or it has an attachment that you are not expecting, don’t trust it. You can even receive spear phishing e-mails from people you know who have had their e-mail accounts hacked through the same method. Here’s a good article that talks more about this technique to infect our infrastructure, take your information and generally cause havoc.
Daily news stories from around the world for the security executive.
A new CareerBuilder survey outlines myths around background checks, noting that not all companies or workers know the process.
The counties that contain Chicago and Detroit and the city of Baltimore were the biggest population losers in the United States from 2015 to 2016.
Very few American consumers have a complete understanding of several consumer-focused cybersecurity concepts, according to a new Pew Research study.
An analysis by Skycure of the patch updates among the five leading wireless carriers in the United States found that 71 percent of mobile devices still run on security patches more than two months old.
Iowa state lawmakers are working on a bill that would ban government entities in the state from installing video or audio monitoring devices in public bathrooms, locker rooms or showers in locations such as libraries, schools or other government offices.
Michigan State Rep. Abdullah Hammoud (D-Dearborn) wants to return arrest powers to mall security officers.
The Trump administration imposed restrictions on carry-on electronic devices on planes coming to the US from 10 airports in Muslim-majority countries in the Middle East and North Africa.
People who identified themselves in a survey as “tech savvy” were 18 percent more likely to be victims of online identity theft. In addition those who said they had Ph.Ds were more frequently victims than high school graduates
Norway jumped three spots and displaced three-time winner Denmark to take the title of "world's happiest country" for 2017.
Legislation has been introduced to protect individual privacy from the growing number of government and commercial drones in use.
Cybersecurity experts recommend that smartphone owners take a number of steps to keep their mobile devices safe and secure. These include using a pass code to gain access to the phone, as well as regularly updating a phone’s apps and operating system. Many Americans, however, are not adhering to these best practices, according to a Pew Research Center report.
Visa unveiled a payment-enabled sunglasses prototype at the South by Southwest (SXSW) festival in Austin, Texas.
According to new research from the Center for Cyber Safety and Education (the Center) and the Executive Women's Forum on Information Security, Risk Management & Privacy (EWF), women comprise only 11 percent of the information security workforce a number that has remained steady since 2013.
There is a widespread and growing need to improve security practices surrounding confidential documents in most organizations today, according to a new study by the Business Performance Innovation (BPI) Network.
U.S. Senators John Cornyn (R-TX), Patrick Leahy (D-VT), and Ted Cruz (R-TX) have introduced the National Cybersecurity Preparedness Consortium Act to authorize the U.S. Department of Homeland Security to work with the National Cybersecurity Preparedness Consortium (NCPC) to help prepare for and respond to cybersecurity risks at the national, state, and local levels.
A U.S. Government Accountability Office report praised federal agencies for collaborating with each other on grid resilience and not duplicating efforts.
Consumers across the globe are more concerned with protecting their financial and payments information stored on a computer than they are with protecting this data when stored on a mobile wallet, according to data.
The American Society of Civil Engineers, which released its 2017 "Infrastructure report card", has given the nation's overall infrastructure a grade of D+.
New USGS maps identify potential ground-shaking hazards in 2017 from both human-induced and natural earthquakes in the central and eastern U.S.
Imposters have overtaken identity thieves to become the nation’s top fraudsters, according to the latest consumer complaint data from the FTC.
Consumer publication Consumer Reports will soon begin considering cybersecurity and privacy safeguards when scoring products.
Wage inequality compared to male colleagues, workplace gender bias and a shortage of female role models are among the main barriers faced by women working in the technology field, according to a survey by technology association ISACA.
A new study has found that people are just as bad witheir mobile passwords as they are with other technology that they own and use.
The European Parliament voted "to force Americans to apply for visas before visiting Europe this summer."
Bipartisan lawmakers in both chambers have proposed local, state and tribal grants to boost cybersecurity.
The Transportation Security Administration has started using new and more rigorous pat-downs at airports.
Longtime (ISC)2 volunteer Professor Howard Schmidt has passed away today. He was the executive director of SAFECode and former White House cybersecurity coordinator, and he spent 30 years contributing to the information security industry. He was recently awarded the 2016 (ISC)2 Harold F. Tipton Lifetime Achievement Award.
Only about half of the violent crimes and a third of the property crimes that occur in the United States each year are reported to police. And most of the crimes that are reported don’t result in the arrest, charging and prosecution of a suspect, according to government statistics.
From package delivery to props in major sporting events, drones continue to play major roles in everyday life. But are enterprises prepared for “The Rise of the Drones” in their operations?
- Cybersecurity Enhancement Act of 2014
- TAC 202 Refresh
- Data Classification Update
- Identity and Access Management (IAM)
- Security Monitoring
- Risk Management Sandbox