<
>

Posts in Cyber Crime & Forensic

Singapore Government Bucking Up Security of the Public Sector Following String of Data Breaches

Following a number of high-profile breaches in the past year, such as the SingHealth data breach which saw up to 1.5 million patient records compromised, the Singapore government has been taking more...

Cybersecurity Maturity Still Lacking on a Global Scale

Cybersecurity maturity is generally lacking among organisations around the world, according to findings of the Dimension Data Executive Guide to the 2019 Global Threat Intelligence Report by NTT...

Bug Bounty Programs: How ethical are they?

Bug bounty programs are an industry best practice, implemented by both public and private sector organisations across industries and regions. A large number of organisations have implemented bug...

Barracuda Research Uncovers Most Popular Phishing Tactics

Between 60 to 90 percent of cyber attacks start from emails, remarked James Forbes-May, the Vice President of APAC Sales for Barracuda, adding that cybercrime has become a lucrative business for...

Can We Remove the Human Element In Cybersecurity? Expert Panel Discusses at CSA Roundtable Event

The C-level cybersecurity roundtable organised by CSA together with IBM and CyberSecurity Malaysia last week, attended by Malaysian business decision makers and IT leaders, was a definite success....

Clash Between Legacy Approaches and New Technologies to Ignite Severe Security Issues for Underprepared Organisations

CSA’s own coverage has seen us publish a number of studies, reports and expert opinions that highlight how widespread, dangerous and persistent the cyber threat problem has become. Technologies...

Forcepoint Leading the Charge in Human-Centric Cybersecurity

Two of the most overused sayings in IT today have to be "data is the new oil" and "people are the weakest link in the cybersecurity chain". There is, of course, a lot of truth in...

Domain Spoofing Explained

What is Domain Spoofing? Domain spoofing is a form of online fraud or phishing technique whereby cybercriminals impersonate a company or its employees using a fake domain that appears...

DON’T LET STOLEN PASSWORDS MAKE YOU EASY PREY FOR CYBER CRIMINALS

By Morey Haber, CTO & CISO at BeyondTrust   If you were a cyber criminal, imagine what you could do with a cache of stolen passwords. Perhaps you might launch a brute force attack against...

Business Email Compromise Explained

What is Business Email Compromise? Business Email Compromise (BEC) refers to fraudulent emails used by cybercriminals to imitate the identity of another party or person in order to scam or...

Pages

Subscribe to RSS - Cyber Crime & Forensic