Following Okta breach, time to take LAPSUS$ teens seriously
The ransomware group LAPSUS$, now known as the hackers responsible for the Okta breach, has returned from what they refer to as a "vacation".
The ransomware group LAPSUS$, now known as the hackers responsible for the Okta breach, has returned from what they refer to as a "vacation".
Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.
Still got an old Blackberry or Compaq laying around? CSO Publisher (and packrat) Bob Bragdon does! Rummaging around Bragdon's attic (with some memory help from mobile office expert Catherine Roseberry) provides a look at how mobile device security has evolved.
Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want
Bill Murphy, CTO and managing director at Blackstone, a global investment and advisory firm, knew he wanted to find a way to allow employees to use their own devices for work. The demand was there, and he was increasingly hearing about how adding in BYOD would help productivity.
This workspace contains 10 security mistakes. Can you spot the errors that put confidential information at risk?
The earliest worms and viruses were created for geeky fun and did little harm - oh, how times have changed. Here are 20 worms, viruses and botnets that show the evolution of malware, from Creeper to Flame.
It's been said that security is hard to measure. Producing measurable results around a lack of problems or incidents is challenging. But the field of security metrics has evolved considerably in recent years, giving security managers more resources to make the case for investing in security programs and technologies.
If you fall for a social engineer's trickery, it's embarrassing.
Social engineers, or "human hackers", have been duping victims from the very beginning of human existence. Here are nine infamous con artists who made history with their scams and schemes.
As a research scientist for Barracuda networks, Daniel Peck has spent much of his time in the last year looking at activity on social networks and analyzing the common tactics used to scam, phish and otherwise trick people into clicking on bad links. A break down of the malicious activity on social networks can be found in By the numbers: How dangerous are Facebook, Twitter, search results (really)?
A scam that has been making its way around Twitter for some time has resurfaced recently and promises to increase a user's followers, but really gives control of one's account to a questionable third party.
Boston-based Bay Cove Human Services is a non-profit organization that offers assistance and service to 4,000 people and families in Massachusetts. CIO Hilary Croach has several technology challenges to contend with. For starters, the agency has its hands in a number of service areas, including helping individuals with developmental disabilities, mental illness, drug and alcohol addiction, and those who need support with aging. With about 140 locations around Eastern Massachusetts, Bay Cove's employees and IT operations are scattered.
Malware creators are already using the news of Osama Bin Laden's death as a opportunity to try and dupe people into clicking on malicious links. According to cloud-security firm Zscaler, researchers were already seeing malicious sites emerge to capitalize on the news within hours of the announcement.
In its recent annual security report, Cisco predicted VOIP abuse as a potential area for cyber crime growth.