The Solution to Overcoming Cyber Threats in A 5g World

Optical Wireless Communciations (Owc) Will Be Key For Maximizing Security By Michael Abad-Santos, Senior Vice President of Business Development and Strategy, BridgeComm Nearly 6 billion Internet of Things (IoT) devices were in service worldwide at the end of 2020, according to Gartner. But mobile operators aren’t the only ones chasing that opportunity. Hackers are, too. … Continue reading The Solution to Overcoming Cyber Threats in A 5g World

Carnival Cruise Cyber-Torpedoed by Cyberattack

This is the fourth time in a bit over a year that Carnival’s admitted to breaches, with two of them being ransomware attacks. Carnival Corp., the world’s largest cruise-ship operator, has sprung another leak: For the second time in a year, attackers have breached email accounts and accessed personal, financial and health information belonging to … Continue reading Carnival Cruise Cyber-Torpedoed by Cyberattack

ERRANT: Realistic Emulation of Radio Access Networks

Mobile networks have become ubiquitous, offering connectivity performance from slow connections up to speeds comparable with broadband connections. Having tools to emulate such variability correctly is paramount to test new protocols and applications before publicly releasing them. Mobile networks have become ubiquitous, but running experiments on them is expensive and challenging, given their complexity and … Continue reading ERRANT: Realistic Emulation of Radio Access Networks

Amazon Prime Day scams resurface for 2021

With this year's Amazon Prime Day set for June 21-22, scammers are already touting "Early Prime Day Deals," says Bolster. Amazon Prime Day represents an opportunity for consumers to find deals and save money on their favorite products. But it's also a chance for cybercriminals to take advantage of another hot topic to try to … Continue reading Amazon Prime Day scams resurface for 2021

Geek Squad Vishing Attack Bypasses Email Security to Hit 25K Mailboxes

An email campaign asking victims to call a bogus number to suspend supposedly fraudulent subscriptions got right past Microsoft’s native email controls. A pair of billing and tech support “vishing” attacks using Geek Squad and Norton Antivirus as cover managed to hit 25,000 mailboxes recently, questing after victims’ credit-card details. Vishing (a contraction of “voice … Continue reading Geek Squad Vishing Attack Bypasses Email Security to Hit 25K Mailboxes

Oleg Koshkin was convicted for operating a crypting service also used by Kelihos botnet

Russian national Oleg Koshkin was convicted for operating a “crypting” service used to obfuscate the Kelihos bot from antivirus software. Russian national Oleg Koshkin was convicted for charges related to the operation of a malware crypting service used by the Kelihos botnet to obfuscate malware and evade detection. “According to court documents and evidence introduced … Continue reading Oleg Koshkin was convicted for operating a crypting service also used by Kelihos botnet

Over a billion records belonging to CVS Health exposed online

Researchers discovered an unprotected database belonging to CVS Health that was exposed online containing over a billion records. This week WebsitePlanet along with the researcher Jeremiah Fowler discovered an unsecured database, belonging to the US healthcare and pharmaceutical giant CVS Health, that was exposed online. The database was accessible to everyone without any type of … Continue reading Over a billion records belonging to CVS Health exposed online

Deloitte Buys Terbium Labs to Expand Threat Intel Capabilities

Deloitte Buys Terbium Labs to Expand Threat Intel Capabilities Terbium Labs' products and services will become part of Deloitte's Detect & Respond lineup, the company confirms. Deloitte has announced its acquisition of "substantially all of the assets of" digital risk protection firm Terbium Labs, marking its third security deal this year. Terms of the deal … Continue reading Deloitte Buys Terbium Labs to Expand Threat Intel Capabilities

Strengthen Your Password Policy With GDPR Compliance

A solid password policy is the first line of defense for your corporate network. Protecting your systems from unauthorized users may sound easy on the surface, but it can actually be quite complicated. You have to balance password security with usability, while also following various regulatory requirements. Companies in the EU must have password policies … Continue reading Strengthen Your Password Policy With GDPR Compliance

Mission Critical: What Really Matters in a Cybersecurity Incident

Mission Critical: What Really Matters in a Cybersecurity Incident The things you do before and during a cybersecurity incident can make or break the success of your response. As a lawyer who figuratively parachutes into dozens of catastrophic cybersecurity incidents a year, I've learned what is truly mission critical during a cybersecurity incident. In leading … Continue reading Mission Critical: What Really Matters in a Cybersecurity Incident