Remove Cybercrime Remove Data privacy Remove Social Engineering
article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

Still, the top response stood out clearlyprotecting data privacy. The thing is, secure communication goes beyond just protecting data privacy. Limited by the character number on the platform, the poll only offered four short answers, which couldnt fully capture the complexity of the topic.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Byron is the founder and editor-in-chief of The Last Watchdog on Privacy & Security. He previously chronicled the emergence of cybercrime while covering Microsoft for USA TODAY. Erin: What are some of the most common social engineering tactics that cybercriminals use?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 291

Security Affairs

A cyberattack crippled the IT infrastructure of the City of Saint John Hundreds of female sports stars and celebrities have their naked photos and videos leaked online Romanians arrested for running underground malware services Threat actor shared a list of 49,577 IPs vulnerable Fortinet VPNs Computer Security and Data Privacy, the perfect alliance (..)

article thumbnail

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

The Last Watchdog

Related: How the Middle East has advanced mobile security regulations Over the past couple of decades, meaningful initiatives to improve online privacy and security, for both companies and consumers, incrementally gained traction in the tech sector and among key regulatory agencies across Europe, the Middle East and North America.

article thumbnail

Security Roundup August 2023

BH Consulting

Curated advice, guidance, learning and trends in cybersecurity and privacy, as chosen by our consultants. Shedding the light of the law on cybercrime methods Today’s cybercrime landscape involves criminals operating across borders as business-like syndicates, says Europol.

article thumbnail

10 Top Ways: Building an Effective Cybersecurity Awareness Campaign

SecureWorld News

Our guests included: Cindy Liebes, Chief Program Officer for the Cybercrime Support Network; Jake Wilson, Security Awareness Evangelist for Western Governors University; and Gretel Egan, Senior Security Awareness and Training Strategist for Proofpoint. I can go into my [saved] folders, and find our folder on social engineering.

article thumbnail

3 of the Worst Data Breaches in the World That Could Have Been Prevented

Security Affairs

Because it was impossible to recover the data, Target had to pay tens of millions in damages to affected customers. The hackers used social engineering techniques, sending phishing emails to several of Target’s vendors, and successfully breached Target’s network. SecurityAffairs – hacking, data breaches).