Security News

While there was no way to fully anticipate the impact to our organizations and be prepared from day-one with a detailed plan, there is a lot we can learn to strengthen our resilience to emerging threats. Phil now leads the group's Cybersecurity Services business which includes Managed Security Services, Security Consulting and Professional Services, and Integrated Security Services.

Immersive Labs announced an industry-first solution to create better-drilled crisis response across institutions of all sizes. Cyber Crisis Simulator will allow people to virtually test their organization's reactions to the latest real-world attacks and is designed to be relevant to everyone from legal and communications teams, to cybersecurity specialists.

The proof is in the results: Phishing attacks of just one type - the business email compromise - have caused at least $26 billion in losses in the past five years alone, according to the FBI. The Heart of the Problem. Almost 90% of email attacks manipulate sender identity to fool recipients and initiate social engineering attacks.

The proof is in the results: Phishing attacks of just one type - the business email compromise - have caused at least $26 billion in losses in the past five years alone, according to the FBI. The Heart of the Problem. Almost 90% of email attacks manipulate sender identity to fool recipients and initiate social engineering attacks.

BlackBerry AtHoc Managed Service delivers the full featured BlackBerry AtHoc system as a service managed and delivered by BlackBerry. BlackBerry AtHoc Managed Service can be up and running in 48 hours.

Gould also told Parliament's Human Rights Committee that data harvested from Britons through NHSX's COVID-19 contact tracing app would be "Pseudonymised" - and appeared to leave the door open for that data to be sold on for "Research". Key to those is a big green button that the user presses to send 28 days' worth of contact data to the NHS. Written by tech arm NHSX, Britain's contact-tracing app breaks with international convention by opting for a centralised model of data collection: all the contact-tracing data is kept under one roof in one central government database.

In a report Thursday looking at how the pandemic will shape organized crime in the EU, Europol said much of the criminality related to the deadly virus reflects the flexibility of criminal organizations, a trend that was already witnessed during previous financial crises. The impact became evident much more quickly, with a sharp increase in cybercrime in the first weeks of the virus's spread. "New and adapted attacks appeared almost immediately from the onset of the crisis and have been among the most visible types of criminality," Europol said.

The Tor Project is laying off a third of its staff due to the current COVID-19 outbreak, the non-profit organization has announced. The developer of the popular privacy-focused Tor Browser said the crisis hit it hard, forcing it to make some difficult decisions.

Zoom is in crisis mode, facing grave and very public concerns regarding the trust in management's commitment for secure products, the respect for user privacy, the honesty of its marketing, and the design decisions that preserve a positive user experience. Knowing how to respond and manage product security incidents is becoming more important for digital companies.

The Wired article argued that it is essential to engineer a way to provide remote access to control system environments for critical infrastructure services such as water, electricity, and fuel refining during the coronavirus crisis. Through server replication, critical infrastructure sites enable 100% real-time visibility into protected networks, 100% protection from remote attacks, with a number of options for truly secure remote access in this time of crisis.