Home Tags Threat

Tag: threat

Computer system threats come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion. Most people have experienced software attacks of some sort. Viruses, worms, phishing attacks, and Trojan horses are a few common examples of software attacks. The theft of intellectual property has also been an extensive issue for many businesses in the IT field. Intellectual property is the ownership of property usually consisting of some form of protection. Theft of software is probably the most common in IT businesses today. Identity theft is the attempt to act as someone else usually to obtain that person’s personal information or to take advantage of their access to vital information. Theft of equipment or information is becoming more prevalent today due to the fact that most devices today are mobile. Cell phones are prone to theft and have also become far more desirable as the amount of data capacity increases. Sabotage usually consists of the destruction of an organization′s website in an attempt to cause loss of confidence to its customers. Information extortion consists of theft of a company′s property or information as an attempt to receive a payment in exchange for returning the information or property back to its owner. There are many ways to help protect yourself from some of these attacks but one of the most functional precautions is user carefulness.

Threat via Whisper prompts FBI to show up: “holy f**k I’m…...

Enlarge If we’ve said it once, we’ve said it 1,000 times: these so-called "anonymous" messaging apps simply aren’t anonymous.To put it another way, if...

Social Media Impersonators Drive Security Risk

A new pool of research digs into the fraudulent social media accounts, a growing threat to individuals and businesses.

Would killing Bitcoin end ransomware?

Ransomware is running rampant.The SonicWall GRID Threat Network detected an increase from 3.8 million ransomware attacks in 2015 to 638 million in 2016.According to...

Build your security defense on data, not guesswork

One of the biggest problems with security defenses is the lack of concrete data to measure the effectiveness of mitigations against threats.In almost any...

Squirrels, Not Hackers, Pose Biggest Threat to Electric Grid

According to Marcus Sachs, CSO with the North American Electric Reliability Corporation, doomsday fears of a cyberattack against the U.S. electric grid are overblown.

Cox must pay $8M in fees on top of $25M jury...

Enlarge / Judge hammer and money (credit: Getty Images) A federal judge has ordered (PDF) Cox Communications to pay a bruising $8 million in legal fees...

Don’t panic over cyber-terrorism: Daesh-bags still at script kiddie level

Medieval terror bastards not great at hacking says ex-top NSA lawyer RSA USA  There’s no need to panic about the threat of a major...

Recorded Future Talks Threat Intel

At the RSA Conference, Recorded Future's vice president of intelligence and strategy Levi Gundert and director of advanced collection Andrei Barysevich discuss threat intelligence....

MEDJACK.3 Poses Advanced Threat To Hospital Devices

A newly discovered version of the "medical device hijack" attack targets older operating systems to bypass security measures and steal patient data.

Raytheon Foreground Security Talks Proactive Risk-Based Security

At RSA, Raytheon Foreground Security's president, Paul Perkinson, and chief strategy officer, Joshua Douglas discuss how to get proactive with advanced threat hunting and...

Breaking The Weakest Link Of The Strongest Chain

Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor.The attack compromised their devices and exfiltrated data...

AppRiver Report Finds Ransomware Most Serious Security Threat

Security firm AppRiver’s 2017 Global Security Report reveals a number of sobering trends in IT security.