Last week, the Internal Revenue Service issued a new warning to employers, urging them to stay alert as reports of compromised W-2 records started to climb. At least 29,000 taxpayers have been affected by W-2 scams since the tax season started last month. Read More ▶ |
|
| White Paper: KnowBe4 Bad guys are constantly coming out with new versions of ransomware strains to evade detection. Is your network effective in blocking ransomware when employees fall for social engineering attacks? KnowBe4's Ransomware Simulator "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 10 ransomware infection scenarios and show you if a workstation is vulnerable to infection. Read More ▶ | Russian interference in the 2016 U.S. election played out in a series of hacks taking place over several months. Here’s how the attacks unfolded. Read More ▶ |
| The iPL23 docking alarm clock radio & charging station supports iPhone 7/7+ and has been discounted on Amazon 25% to $59.95. Read More ▶ |
| Microsoft will likely wait until February 14 to fix a publicly disclosed vulnerability in the SMB network file sharing protocol that can be exploited to crash Windows computers. Read More ▶ |
| | The implementation of the SMB network file sharing protocol in Windows has a serious vulnerability that could allow hackers to, at the very least, remotely crash systems. Read More ▶ |
| Leaders in the security industry make friends with high school students, introduce cyber careers. Read More ▶ |
| The U.K.’s defense secretary is accusing Russia of using cyber attacks to “disable” democratic processes across the West, and he's demanding that NATO fight back. Read More ▶ |
| White Paper: Leidos A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! This white paper discusses the universal challenges facing every SOC: Resource allocation, Threat alert management, Vendor dependencies, Intelligence standardization Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|