Credentials: Check and Protect

Author(s):

Alex Haynes, CISO, Cheshire Datasystems Ltd.

Protect Credentials from Breaches

Today, breaches continue unabated at the same alarming rate to which we have grown accustomed. More than 36 billion records were exposed in 2020 alone and that’s only counting those we know about. The real figure will rise far higher. The rate of these data leaks is so frequent that it is hard to track … Read more

Bad Networking: What is a Botnet?

Author(s):

Patrick Putman, ,

Botnet Bot Herder

What is a Botnet? There are countless threats to computer security. Many of these threats are nothing more than good technologies used for bad reasons. One example of this is a botnet. Short for “Robot Network,” it is a group of connected computers controlled by software. This software is then used to perform a specific … Read more

Proving a Negative

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

KBA and Data Breaches

Proving there is a “you” has never been easier; proving you are the only you, not so much. We learned in math class in high school that you cannot prove a negative. Or to be more precise, we learned that you cannot solve a negative proof. As a result, in math and logic, we spend … Read more

Addressing the Rapidly Growing Threat of Wire Fraud

Author(s):

Matt Lindley, COO, CISO, NINJIO

Wire Fraud

Most cyber-attacks are intended to steal sensitive and personal information, which can later be used to breach accounts, hijack a victim’s identity, or steal money. However, some cybercriminals opt for a more direct form of theft, they send fraudulent requests that ask victims to complete a wire transaction and send money straight to them. This … Read more

How to Protect Yourself and Your Data from Privacy Invasion Both On and Offline

Author(s):

James Keenan, Automation and Anonymity Evangelist, Smartproxy

Protect Yourself and Your Data from Privacy Invasion Both On and Offline

American author Joseph Heller once said that “You’re not paranoid if they’re really after you” add to this “and they are using technology to do so” and then you will have today’s reality. Protecting yourself from Big Brother is becoming increasingly necessary as governments become more invasive and smarter in their use of technology. This is … Read more

Brand Protection is Essential for Cybersecurity

Author(s):

Karolina Kazlauskaite, Copywriter, Oxylabs

When we mention brand protection, we are referring to protecting your product, service, and brand image from plagiarism. Business owners invest time, effort, and money to brand and grow their company to then be victimized by cybercriminals who counterfeit their brand and their products. In turn, they steal a part of their revenue and, more often than … Read more