The Security Ledger
Organizations lost $2.7 billion to Internet-enabled theft, fraud and exploitation in 2018, with business e-mail compromise scams resulting in the highest of these financial losses, according to the FBI’s Internet Crime Complaint Center (IC3).
The post FBI: Cybercrime Accounted for $2.7B in Losses in 2018 appeared first on The Security Ledger...
Tufin (TUFN) became the latest cyber security firm to have an initial public offering. In our first segment, we speak to its co-founder and CEO Reuven Kitov. Also: as more and more applications and workloads shift to the cloud, securing high-performance Linux environments has become a priority. In our second segment, we speak with Kelly Shortridge...Related Stories
New malware, LoadPCBanker, is leveraging Google's Sites to spread via drive-by download attacks, according to a new report. Companies are advised to block uploads and downloads from the service.
The post Drive-By Malware Uses Google Sites for Drive by Download Attacks appeared first on The Security Ledger.Related Stories
Distil Network's annual assessment of bad bots, “Bad Bot Report 2019: The Bot Arms Race Continues,” found that bad bots accounted for one in five website requests in 2018, or 20.4 percent of web traffic.
The post Report: Bad Bots sent One in Five Web Requests in 2018 appeared first on The Security Ledger.Related Stories
In this week’s episode, #142: we continue our series on Life after Passwords: the Future of Online Identity as we are joined by Ophir Gaathon, the CEO of the firm Dust Identity.
The post Podcast Episode 142: On Supply Chains Diamond-based Identities are forever appeared first on The Security Ledger.Related Stories
Supply chain hacks like ME Docs and ASUS aren’t inevitable. In this Spotlight Podcast, sponsored by Trusted Computing Group, I speak with Dennis Mattoon, a Principal Researcher at Microsoft Research and the Chairman of the Trusted Computing Group’s DICE Architectures Working Group* about how strong device identities for IoT endpoints...Related Stories
Researchers at the firm FireEye warn that TRITON, a type of malware that targets industrial control safety systems, has resurfaced at a facility in the Middle East.
The Trump Administration's designation of Iran's Islamic Revolutionary Guard Corps as a foreign terrorist organization could prompt retaliatory cyber attacks from state-sponsored actors from the Islamic Republic, security researchers from Recorded Future warn.
The post Warning: Trump Terrorist Designation May Prompt Iranian Cyber Attacks appeared...
Countless Congressional hearings, 48 state data privacy laws and GDPR and mega breaches like the discovery of data on 500 million Facebook users just keep happening. Why? In this episode of the podcast, Paul is joined by experts from the firm BitSight and BigID to discuss why we can't seem to stop the breaches.
The post Podcast Episode 141:...Related Stories
College and university campuses are notoriously difficult to tame. In this one-on-one interview, I speak with Plamen Martinov, the Chief Information Security Officer for the Biological Sciences Division at the University of Chicago about how his organization has used NIST's Cybersecurity Framework to create a security lingua franca at UChicago and...
Security researchers managed to take remote control of the Autopilot feature of Tesla Model S car using a wireless gaming keypad, highlighting the potential security issues with next-generation automobiles' Advanced Driver Assistance Systems (ADAS) that are meant to enhance driver safety.
Alpha-numeric passwords have been with us almost since the dawn of the computing age. But our guest this week, Phil Dunkelberger the CEO of Nok Nok Labs, says they've overstayed their welcome, and that the next few years may see them disappear altogether. We talk about what will replace them and how.