LinkedIn Scammer Techniques Are Getting Scary
This is an update to the article about identifying LinkedIn scammers when they request a connection. In that article we listed six ways to identify fake accounts: 1.Look at that URL.…
This is an update to the article about identifying LinkedIn scammers when they request a connection. In that article we listed six ways to identify fake accounts: 1.Look at that URL.…
NetScout, a vendor of network management tools, has filed a suit against Gartner claiming that Gartner has a “pay-to-play” business model. The suit states that Gartner made false and defamatory statements regarding NetScout,…
In its 17th year, the annual Black Hat security conference was bigger than ever, with more than 8,000 registered attendees, 147 vendors exhibiting in the expo hall, and more workshops.…
Way last April, a time when the world seemed a more peaceful place, Leon Panetta and Richard Clarke were quoted warning of impending Russian cyber attacks in the wake of…
This past February I participated in an amazing three day innovation and ideation lab pulled together by Farnam Jahanian, Assistant Director, Directorate for Computer and Information Science and Engineering, National…
According to a report in Foreign Policy, former NSA head Keith Alexander has ideas. Ideas he wants to patent and turn into a business. Admittedly, Alexander has had exposure to…
The House Committee on Homeland Security passed three cybersecurity bills with broad bipartisan support on Monday. The Critical Infrastructure Research and Development Advancement Act of 2013 amends the Homeland Security…
Ok, maybe it’s not a marriage but more along the lines of living together. In a previous article, I spoke about moving to a Continuous Monitoring security model, which focuses on…
Six people were indicted on Wednesday as part of an international ring of cyber-criminals that hijacked over 1,000 StubHub accounts and defrauded the ticketing service of approximately $1.6 million, the Manhattan…
Cybercriminals are successfully bypassing two-factor authentication systems at some European banks and transferring funds out of victim accounts, Trend Micro said. The sophisticated attack campaign uses malicious email attachments, phishing…