OurMine is at it Again! How They Broke in to MineCraft Accounts
Gamers are one of the largest communities on the internet. YouTube’s most subscribed channel caters to players, 100 million of them watch gameplay streaming on Twitch.tv every month, and Pokémon Go has just conquered the world. But this robust online presence has also sparked interest from another group: cybercriminals. ...
Going The Extra Mile: Pandora, Facebook, and Netflix Ask Users to Reset Passwords
It’s a good sign when businesses take the initiative to protect consumers’ online safety. Not only does it allow customers to feel secure using their services, but it also facilitates positive change. When one business takes an extra step to protect users, industry security standards are advanced. The envelope is ...
What We Can Take Away from the Milwaukee Bucks Data Breach
Large sports leagues are no strangers to the spotlight, and basketball is no different. The latest scandal? Last week, a major security incident put the NBA on center stage. The Milwaukee Bucks basketball team had their financial information stolen by cybercriminals, thanks to a very convincing email scam. Here’s what ...
Study Reveals the Most Common Attack Methods of Data Thieves
This blog post was written by Raja Patel. Learning more about your attackers helps to improve your security profile and reduce the possibility of a breach. Sophisticated criminals using advanced techniques are behind most of the recent security breaches, targeting small network openings and user weaknesses left vulnerable by even ...
Verizon DBIR: Noise & Attack Patterns Mapped to 20 Critical Controls
This blog was written by Barbara Kay. In our Security Connected discussions, security leaders routinely ask “Where do I invest for results? How do I communicate the risk reduction impact of security investments to the Board?” Now there’s practical assistance on which controls count and why: guidance based on attack ...
How to Protect Your Cash Register from Cyber Criminals
By now, everyone in has heard about the Target and Neiman Marcus data breaches. We’ve recently discovered these retail attacks have been targeting Windows-based cash register systems aka point-of-sales (POS) systems. Hackers are finding ways to penetrate retailers’ networks and install malware on their Windows-based cash register systems and Back-of-the-House ...