Similar Posts
Banking Social Engineering Scams are Alive and Well
ByadminThe easiest way for hackers to steal your money is to get you to help them do it. We are seeing attacks where the victim gets a text message supposedly from their bank about a potentially fraudulent transaction and asking the victim if it is legitimate. If the victim answers, the hacker goes into high…
Will You be the Last to Know?
ByadminExternal attack surface management tools (EASM) allow anyone to get a sense of your security prep without your permission or even your knowledge. Who uses EASM tools? Your competitors against you, your customers to decide if they want to do business with you, members of the public, your insurance carrier to decide if they want…
- CMMC | Compliance | DIB | DoD | IT Infrastructure | Legal | Privacy | Security News Update | User tips
Security News Update for January 19, 2025
ByadminThis week’s news includes:
Security by Design – A Great Example
ByadminRecently the communications technology firm Twillio was hacked and a number of their customer’s accounts were compromised. Among those compromised was the account of the secure messaging app Signal. While this is not good, Signal spent a lot of effort baking in security by design. Learn about what they did and why those efforts towards…
Protecting Website Security Question Answers
ByadminIn light of the recent Callaway golf equipment vendor’s websites (multiple) breaches, which compromised security questions and answers, here is a simple tip to reduce your risk going forward from these breaches.
Cyber Insurance – Hard to Get, Harder to Keep
ByadminIf you have tried to get cyber risk insurance recently, you know that it is a whole new world. After years of collecting premiums, insurance companies have had to write checks. A lot of checks. They don’t like that so much. As a result, premiums have gone up, coverage has gone down, underwriting has become…