The Latest in IT Security

1

Allegedly created in 2010 by Svyatoslav Bondarenko, of Ukraine, the cybercrime group was involved in the theft, sale, and dissemination of personally identifiable information (PII), credit card data, and malware, among others. In 2018, the United States Department of Justice (DoJ) announced charges against 36 individuals believed to be members of the crime ring, as […]

Read more ...

1

The man, Joseph James O’Connor, 22, was previously charged for using SIM swapping to hack over a hundred high-profile Twitter accounts in July 2020, to promote a cryptocurrency fraud scheme. O’Connor was arrested in Spain earlier this year. In SIM swapping attacks, cybercriminals pose as their intended victims in conversations with mobile network provider support […]

Read more ...

1

Cyber awareness may seem fairly obvious, but it’s not always. For example, you would never post a photo of your driver’s license on Facebook, right? How about your company ID card? Then there’s that selfie you took at the office. Were you wearing your work badge? Not a good idea. Part of cybersecurity awareness is […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments