Home Tags Threat

Tag: threat

Computer system threats come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion. Most people have experienced software attacks of some sort. Viruses, worms, phishing attacks, and Trojan horses are a few common examples of software attacks. The theft of intellectual property has also been an extensive issue for many businesses in the IT field. Intellectual property is the ownership of property usually consisting of some form of protection. Theft of software is probably the most common in IT businesses today. Identity theft is the attempt to act as someone else usually to obtain that person’s personal information or to take advantage of their access to vital information. Theft of equipment or information is becoming more prevalent today due to the fact that most devices today are mobile. Cell phones are prone to theft and have also become far more desirable as the amount of data capacity increases. Sabotage usually consists of the destruction of an organization′s website in an attempt to cause loss of confidence to its customers. Information extortion consists of theft of a company′s property or information as an attempt to receive a payment in exchange for returning the information or property back to its owner. There are many ways to help protect yourself from some of these attacks but one of the most functional precautions is user carefulness.

Uncovered iPad bomb plot blamed for electronics ban on some flights

(credit: Travis Olbrich) The US-UK ban on electronic devices larger than a mobile phone for some flights from Africa and the Middle East stems,...

The North Atlantic may get is first-ever named storm in March...

Enlarge / The European model shows the formation of a subtropical cyclone next Tuesday in the Atlantic Ocean. (credit: Weather Bell) Just one...

Prioritizing Threats: Why Most Companies Get It Wrong

To stay safer, focus on multiple-threat attack chains rather than on individual threats.

Malware finds unwitting ally in GitHub

Just because it's on GitHub doesn't mean it's legitimate.A financially motivated espionage group is abusing a GitHub repository for C&C (command and control) communications,...

Man sentenced to 3 years for Facebook threat to kill Obama...

Enlarge (credit: Lewis Mulatero/Getty Images) Brian Dutcher A Wisconsin man lost his bid before a federal appeals court to set aside his 3-year...

Shielding MAC addresses from stalkers is hard and Android fails miserably...

Enlarge (credit: Christiaan Colen) In early 2015, architects of Google's Android mobile operating system introduced a new feature that was intended to curtail...

The Alpha Magnetic Spectrometer has a problem with its cooling system

Enlarge / A view of the Alpha Magnetic Spectrometer on the station. (credit: NASA) Launched to the International Space Station in 2011 on the...

Windows ‘DoubleAgent’ Attack Turns AV Tools into Malware

Zero-day attack exploits a legitimate process in Windows, according to Cybellum; AV vendors downplay threat.

Search begins for workarounds to Microsoft’s Win7/8.1 on Kaby Lake/Ryzen patch...

Microsoft is carrying through on its threat to actively block Windows 7 and 8.1 updates on the latest Kaby Lake and Ryzen processors.Some folks are...

The search for workarounds to the Win7 Kaby Lake/Ryzen patch ban

Microsoft’s going ahead with its threatened block of Win7 and 8.1 updates on the latest Kaby Lake and Ryzen processors.Some folks are looking at...

You’re right. That ‘electronic Muslim ban’ makes no sense

Analysis: US officials have been less than forthcoming regarding a potential threat, which only hurts public trust and confidence.

Citing terror threat, US confirms electronics ban on some US-bound flights

Senior administration officials said terrorists are 'aggressively pursuing' ways to carry out new attacks, such as smuggling explosive devices in consumer items, but left...