HackSurfer is moving on 6/3/15 - Learn More

  • Daily Roundup
  • Recent Posts
More
  • Featured
  • Community
IT

Criminals use six basic principles to influence and steal. In the first post we discussed:Reciprocation: Do something nice for a person and they will feel obligated to return the favor.Social Proof: This is the “It’s okay if everyone else does it” approach.Commitment and Consisten...

Read More

Most Notable Info
According to a report released by the FBI, America spent a lot of money on cybercrime last year. News Week reported:

“The Federal Bureau of Investigation’s Internet Crime Complaint Center (IC3) tallied 269,422 complaints in 2014, totaling $800,492,073...

Read More
IT

Criminals use six basic principles of Influence to steal. In this post we will discuss the first 3. The ability to influence boils down to science. By applying some science, anyone can learn to be more influential. It’s easy to influence sheep and cattle. It’s a bit more complicat...

Read More
Financials

Another one bites the dust. BitFinex's hot wallet was hacked; the company issues a statement: "“Dear Customer although we keep over 99.5% of users' BTC deposits in secure multisig wallets, the small remaining amount in coins in our hot wallet are theoretically vulnerable to attack...

Read More
Financials

Nash Holdings is the week’s top trending target, replacing last week’s number one, Sally Beauty Holdings.
Nash Holdings made headlines this week after The Washington Post – owned by Nash Holdings – was attacked by the Syrian Electronic Army (SEA). The Washington Post wr...

Read More
IT

Most Notable Info

Last week Krebs on Security broke the data breach of the ‘everyman spyware’ company mSpy. This week they take it one step further as mSpy denies it has been hacked despite heavy evidence to the contrary. It seems a pattern these days for companies to de...

Read More
Government

Most Notable Info

New changes to the Computer Fraud and Abuse Act have some researchers worried. 
Kaspersky’s Threat Post reported:


“Professional security researchers concerned about proposed changes to the Computer Fraud and Abuse Act (CFAA) that includ...

Read More
IT

On May 19 the Ponemon Institute released a survey that took a look at advanced threat detection, DDoS attacks, and budget and staffing decisions between financial and retail firms. Arbor Networks sponsored the survey. 
The survey includes responses IT and IT security practit...

Read More
IT

Public Wi-Fi is the location where you can get online: airport, airplane, coffee house, hotel, motel and more. Many people don’t give this a second thought, unaware of how risky this really is.Public Wi-Fi is very non-secure, a goldmine for hackers who want to steal your identity ...

Read More
Telecom

Most Notable Info
A new article on Tom’s Guide goes to show how the world sees things differently from one country to the next. While users are upset about mSpy being hacked South Korea is mandating that all mobile devices for users under the age of 18 must have spyware insta...

Read More

A Ponemon study released in April 2015 offers a look at the top concerns of executives around the security of emerging payment technologies. The study surveyed 748 US-based individuals in IT and IT security, risk management, product development, and others involved in the payments...

Read More

Most Notable Info
Today’s main article is brought to you by our very own Founder and Chief Architect, Jason Polancich. He recently covered an important topic over at Security Week:

“Since starting a cyber risk intelligence firm almost two years ago, I’ve had a great op...

Read More

Keep up with Possible Threats to Your Business. And Much More.

Top Active Users
Most Viewed | Past 5 Days
New Sharers