Search Results for: consumers Blog Post France Fines Google, Facebook €210 Million Over Privacy Violating Tracking Cookies January 31, 2022 The general public and government authorities are becoming increasingly conscientious about protecting data privacy online. In recent years, we’ve seen... Blog Post FBI Consumer Alert: Building a Digital Defense Against Vacation Rental Scams May 30, 2019 CONSUMER ALERT: Tips to Avoid Vacation Rental Scams. “…It seems like it has never been easier to find the perfect... Blog Post Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning... Blog Post Key Takeaways from The Recent McDonald’s Data Breach August 12, 2021 McDonald’s, one of the world’s largest food franchises, has been added to the list of high-profile companies that have experienced... Blog Post MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of... Blog Post Security Challenges Law Firms Facing in 2021 August 26, 2021 Organizations across all fields are facing increased pressure to be able to respond to an ever-increasing array of cyber threats... Blog Post Researchers Aim to Trace PII Data Sharing Through 300 Fake Accounts October 6, 2021 Due to a number of high-profile incidents, the way in which big companies and data brokers use (or, abuse) or... Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered... Blog Post How Fake Accounts and Sneaker-Bots Took Over the Internet September 3, 2021 If you’ve used any form of social media before, you have run into fake accounts with less-than-noble intentions. Usually, these... Blog Post Spread of Ransomware Through SEO Poisoning November 18, 2021 SEO poisoning or search poisoning is a cybercrime strategy that hackers use to lure visitors to malicious sites by using... Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently... Blog Post Unprecedented Amounts of Usernames and Passwords for Sale July 31, 2020 There has been a large increase of consumer credentials being sold on the dark web. A 300 percent increase in... Blog Post New Ransomware Groups Emerge To Massively Change the RaaS Ecosystem January 24, 2022 Intel 471, a cybercrime intelligence company, has recently claimed to have observed a massive change in the RaaS (ransomware-as-a-service) ecosystem.... Blog Post Over 9 million Android Devices Infected by Trojan Disguised as Game Apps December 21, 2021 An info-stealing trojan has found its way onto more than 9 million Android devices through Huawei’s AppGallery app store. Over... Blog Post Is IASME a viable alternative to ISO 27001 certification? July 15, 2021 ISO/IEC 27001 is considered by many to be the de facto international standard on how to manage information security. In...
Blog Post France Fines Google, Facebook €210 Million Over Privacy Violating Tracking Cookies January 31, 2022 The general public and government authorities are becoming increasingly conscientious about protecting data privacy online. In recent years, we’ve seen...
Blog Post FBI Consumer Alert: Building a Digital Defense Against Vacation Rental Scams May 30, 2019 CONSUMER ALERT: Tips to Avoid Vacation Rental Scams. “…It seems like it has never been easier to find the perfect...
Blog Post Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning...
Blog Post Key Takeaways from The Recent McDonald’s Data Breach August 12, 2021 McDonald’s, one of the world’s largest food franchises, has been added to the list of high-profile companies that have experienced...
Blog Post MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of...
Blog Post Security Challenges Law Firms Facing in 2021 August 26, 2021 Organizations across all fields are facing increased pressure to be able to respond to an ever-increasing array of cyber threats...
Blog Post Researchers Aim to Trace PII Data Sharing Through 300 Fake Accounts October 6, 2021 Due to a number of high-profile incidents, the way in which big companies and data brokers use (or, abuse) or...
Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered...
Blog Post How Fake Accounts and Sneaker-Bots Took Over the Internet September 3, 2021 If you’ve used any form of social media before, you have run into fake accounts with less-than-noble intentions. Usually, these...
Blog Post Spread of Ransomware Through SEO Poisoning November 18, 2021 SEO poisoning or search poisoning is a cybercrime strategy that hackers use to lure visitors to malicious sites by using...
Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently...
Blog Post Unprecedented Amounts of Usernames and Passwords for Sale July 31, 2020 There has been a large increase of consumer credentials being sold on the dark web. A 300 percent increase in...
Blog Post New Ransomware Groups Emerge To Massively Change the RaaS Ecosystem January 24, 2022 Intel 471, a cybercrime intelligence company, has recently claimed to have observed a massive change in the RaaS (ransomware-as-a-service) ecosystem....
Blog Post Over 9 million Android Devices Infected by Trojan Disguised as Game Apps December 21, 2021 An info-stealing trojan has found its way onto more than 9 million Android devices through Huawei’s AppGallery app store. Over...
Blog Post Is IASME a viable alternative to ISO 27001 certification? July 15, 2021 ISO/IEC 27001 is considered by many to be the de facto international standard on how to manage information security. In...