
Buying fraud right off the virtual rack
Report finds fraud running rampant, especially in the retail sector.


Bot attacking gift card accounts
Distil Networks has found a bot affecting nearly 1,000 customer websites. Gift cards are under attack by hackers, and consumers are being advised to check their balances.

Report says smart people do dumb things online
People from the religious and legal fields were considered lazy for not following security standards.

Report finds the security of confidential documents is a significant problem
60 percent of survey respondents say sensitive documents have accidentally been sent to the wrong person.

Phishing campaign uses Yahoo breach to hook email
A phishing email sent out within hours after the Yahoo breach news broke is preys on users' concern about their account security

IoT botnet bogs down college campus network
Senior members of the unnamed university’s help desk had been receiving an increasing number of complaints from students across campus about slow or inaccessible network connectivity. With Verizon's help, they tracked down the botnet...

Study shows Americans are a cocky bunch when dealing with cybersecurity and nude photos
A majority of those surveyed by Blumberg Capital believe they know more about cybersecurity than President Trump and their mothers.

How to tell if Pokemon Go is malware
Mobile security company Zimperium is putting out the alert to make sure users are cognizant of these apps when they head into app stores.

Ransomware steals 8 years of data from Texas police department
Videos that were evidence to crimes are now lost. Attorneys are ready to pounce.

Inside a ransomware attack: Infecting a system with Locky
To demonstrate the speed and devastation that comes with a Ransomware attack, we infected one of our own systems.

Video: How to recover a system from a Ransomware attack
Having a system infected with Ransomware can be a painful and frightening experience for some. However, if you’ve got backups and some time on your hands, it is possible to recover from a Ransomware attack. Here's how you do it.

Top celebrity online security screwups in 2016
Password manager announces its inaugural "P@ssholes of the Year" list. The list highlights the high-profile people and organizations that experienced the biggest password-related blunders of 2016.

Survey says men bothered more about retail breaches than women
Men are also more likely to switch to a competitor following a data breach than are women.

Pokémon Go players robbed at gunpoint, suspects arrested
Last week, people all over the U.S. started walking around in circles staring at their phones. No, they're not lost; they're playing a game – Pokémon Go. Most of those who have started playing, are reporting positive experiences, but...

Privacy, risk and trolls: Dealing with the security challenges of YouTube fame
It seems a new YouTube star is born every day lately with thousands now making money and pursuing full-time careers in online video. But the popularity that comes with millions of viewers is not without its privacy challenges

Internet trolls hack popular YouTube channel WatchMojo
Late Wednesday evening, hackers operating under the name Poodle Corp compromised the WatchMojo.com YouTube channel and started tagging dozens of videos. The account hijacking was quickly detected, and the company turned to YouTube for...

Walmart mystery shopper scam resurfaces
A mystery shopper scam targeting Walmart customers, which has been around since at least 2011, has resurfaced. Reports of the scam have started circulating on Facebook and other parts of the Web, from people who have gotten checks of...

9 tips to prevent you from falling for a tax scam
Tyler Moffitt, senior threat research analyst at Webroot, provides tips for staying secure this tax season.

Credit card terminal goes from safe to compromised in less than three seconds
In a video released by Miami Beach Police, two men work as a team to install a credit card skimmer at a local gas station. In less than three seconds, the terminal goes from safe to fully compromised.
-
White Paper
-
Sponsor Article
Sponsored -
Video/Webcast
Sponsored -
White Paper
-
White Paper