The Latest in IT Security

Posts Tagged ‘Manipulation’

The second lesson is that we should be paying more attention to attacks that aim to undermine the legitimacy of an election rather than changing the election’s result. Election-stealing attacks have gotten most of the attention up to now — ­and we are still vulnerable to them in some places — ­but it appears that external threat actors may be more interested in attacking legitimacy.

Read more ...

The Office of Personnel Management (OPM) data breach shows us how espionage is done in the digital world. It’s not only about the theft of information; it’s also about the potential manipulation of personal data. Records can be changed to make a federal employee appear less trustworthy or possibly destroyed to make a person disappear, […]

Read more ...

Summer movies are highly anticipated by the moviegoers, because Hollywood traditionally releases its biggest blockbusters during this season. Fraudsters are relentless in creating fake streaming sites, not just on the screening date of these movies, but also before the release of movies in theaters.The next two charts show which movies are most popular with attackers, as […]

Read more ...

Categories

TUESDAY, SEPTEMBER 18, 2018

Featured

Archives

Latest Comments

Social Networks