The latest viral scam making its way around Facebook is a lure that asks users if they want to install a "dislike" button, according to security firm Sophos.
Stories by Joan Goodchild
Most organizations have been the target of an advanced threat, according to results of a study released this week by Ponemon Institute and sponsored by NetWitness.
Security managers can keep blocking Facebook, refusing to support mobile devices and vetoing cloud-based services, but they aren't going away.
Data security and breach prevention ranks low as a risk factor for most big technical companies, according to new research that identifies the most widespread concerns among the 100 largest U.S. public technology companies. The research, released by BDO, a professional services firm, examines the risk factors listed in the fiscal year 2009 10-K SEC filings of the companies; the factors were analyzed and ranked in order by frequency cited.
In almost two decades of work in the financial services industry, Brad McFarland has spent most of that time heading up fraud investigations. McFarland, currently director of corporate security with The South Financial Group, a South Carolina-based financial services holding company, is also responsible for the organization's physical security and loss preventions in addition to fraud investigation.
In 1993, Private Investigator Joe Seanor had wrapped up employment stints in the CIA and the Department of Justice, and was looking for something new in his professional life.
In Boston, law enforcement officials arrested three men in January accused of being part of an international crime effort to steal money from ATMs around Eastern Massachusetts.
Banging the drum for security awareness never gets old. As much as CSOs try to get folks to bone up on safe practices (both online and in the office), there are always going to be some who need reminding.
There is a new kid in town in the world of botnets - isn't there always? A heavyweight spamming botnet known as Festi has only been tracked by researchers with Message Labs Intelligence since August, but is already responsible for approximately 5 percent of all global spam (around 2.5 billion spam emails per day), according to Paul Wood, senior analyst with Messagelabs, which keeps tabs on spam and botnet activity.
Hackers may be using your office printer as a conduit for criminal activity. Think about it: A printer in today's office environment often saves on its hard drive all images of documents that are printed, scanned or faxed. Therefore, hackers who know anything about accessing files on a network might easily gain access to that sensitive data (Read about some of the security features on modern printers in Joe's Office: Secure Printer).
You've got a few security guards and your CCTV system is up to snuff. You've got your building security covered, right? Think again. While many organizations are taking the steps to ensure their building is secure, many are ignoring basic pieces of the puzzle that is physical security in and around a facility.
Security is on the minds of companies and many are still making room in their budgets to invest in IT security initiatives, according to a survey released Monday by Robert Half Technology.
What the average guy might call a con is known in the security world as social engineering. Social engineering is the criminal art of scamming a person into doing something or divulging sensitive information. These days, there are thousands of ways for con artists to pull off their tricks (See: Social Engineering: Eight Common Tactics). Here we look at some of the most common lines these people are using to fool their victims..
A warning to those who love such social media sites as Facebook: The bad guys are coming for you.
John had a massive challenge to tackle. A former IT security officer at a large bank in New York, he and his wife packed up and moved across the country so he could take on the role of chief security officer with a well-known provider of loans, retail financing, and other credit related products.