The Latest in IT Security

1

Threat actors linked to North Korea have been known to launch — in addition to espionage and destructive campaigns — financially-motivated attacks, including against cryptocurrency exchanges and banks. These profit-driven attacks are believed to have helped Pyongyang raise significant amounts of money. Sansec believes North Korean hackers, tracked by many as Lazarus and Hidden Cobra, […]

Read more ...

1

The latest memo from the U.S. Secret Service reveals that overseas criminals are registering for unemployment claims using stolen Social Security numbers and personally identifiable information (PII). Unemployment benefit scams are not unique, but the Coronavirus pandemic has given fraudsters new ways of exploiting the surge in newly unemployed workers who file for benefits. “A […]

Read more ...

1

The Department of Interior is grounding all non-emergency drones due to security concerns: The order comes amid a spate of warnings and bans at multiple government agencies, including the Department of Defense, about possible vulnerabilities in Chinese-made drone systems that could be allowing Beijing to conduct espionage. The Army banned the use of Chinese-made DJI […]

Read more ...


Categories

SUNDAY, AUGUST 09, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments