Zephyrnet Logo

Tag: threats

KnowBe4 and Agari Work Together to Transform Phishing Protection

According to the FBI Internet Crime Complaint Centre’s 2019 Internet Crime Report, phishing was the top crime reported by victims in 2019 with...

Advanced Tech Needs More Ethical Consideration & Security

Unintended consequences and risks need board-level attention and action.Even the best inventions and intentions can result in unintended consequences. Email vastly improved many...

How to Secure Your Network

Over time, we are exposed to the dangers that are entirely new and unknown for us. The way we work is different...

Smashing Security #168: The Bitcoin fraud factory

Industry veterans, chatting about computer security and online privacy. Fraudsters steal millions from those hoping to jump on the Bitcoin bandwagon,...

Fake reviews & third-party apps cause 50% of threats against Android

<!-- Fake reviews, third-party apps cause 50% of threats against Android ...

Fake reviews & third-party apps cause 50% of threats against Android

<!-- Fake reviews, third-party apps cause 50% of threats against Android ...

Ransomware getting more fearsome, but there’s reason for optimism

Cybercriminals continued a barrage of attacks in 2019, spurred on by botnets of infected IoT devices and by attacker interest in the Eternal...

How adaptive trust makes security efficient

Zero trust is a comprehensive security framework that requires everyone—and every service account—to authenticate identity before entering the corporate network. Every app and...

Episode 177: The Power and Pitfalls of Threat Intelligence

Podcast: Play in new window | Download (Duration: 30:18 — 41.6MB)Subscribe: Android | Email | Google Podcasts | In this week’s podcast (#177)...

CEOs & Board Members “12 Times More Likely” To Be Target Of Cyber Attack

As the value of data increases, those with top-level access are fast becoming the target of choice. Here’s how, why, and what...

CEOs & Board Members “12 Times More Likely” To Be Target Of Cyber Attack

As the value of data increases, those with top-level access are fast becoming the target of choice. Here’s how, why, and what...

Top 5 technologies for defence and security

Advances in technology are reshaping global security capabilities, from enhancing the way to helping mitigate the impact of natural disasters....

Latest Intelligence

spot_img
spot_img