Quantcast

Latest Computer crimes Stories

2014-06-05 08:21:44

GAITHERSBURG, Md., June 5, 2014 /PRNewswire/ -- Lockheed Martin (NYSE: LMT) commemorated the tenth anniversary of the formal creation of its enterprise cyber defense organization, the Lockheed Martin Computer Incident Response Team (LM-CIRT), by discussing the growing cyber threats facing corporate and government networks and looking forward to delivering another decade of cyber security services. http://photos.prnewswire.com/prnvar/20110419/PH85737LOGO-b At a celebration in one of the...

2014-06-04 08:40:56

CLEARWATER, Fla., June 4, 2014 /PRNewswire/ -- WHAT: ThreatTrack Security CEO Julian Waits, Sr. will host the 2014 Cyber Security Summit, taking place in Washington, D.C., on Thursday, June 5, 2014. The Summit brings C-level and senior executives responsible for protecting critical infrastructures together with cutting-edge technology providers and renowned information security experts. http://photos.prnewswire.com/prnvar/20140219/NE67666LOGO WHEN: Thursday, June 5, 2014, 8:55...

2014-06-03 12:34:05

iThreat Cyber Group & InsideCounsel Magazine Gauge Corporate Ability to Thwart Adversarial Attacks PRINCETON, N.J., June 3, 2014 /PRNewswire/ -- Two out of three legal counsels representing a cross section of Fortune 1,000 companies acknowledge they are not "very well prepared" to prevent a significant, material attack on their product, brand or intellectual property, according to a new survey by InsideCounsel Magazine commissioned by iThreat Cyber Group. "These results are telling," stated...

2014-06-02 08:35:53

Report Details How Traditional Exploit Techniques Used In Innovative Ways Can Mask Dangerous Threat Activity SANTA CLARA, Calif., June 2, 2014 /PRNewswire/ -- Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today revealed new research on how attackers exploit commonly-used business applications to bypass security controls -- and provides helpful insight into how business leaders and security practitioners need to reassess and strengthen their security posture. To view...

2014-05-31 23:05:44

As the Iranian cyber espionage attack called Newscaster is exposed, the power of social engineering again steps into the spotlight. Joe Caruso, founder and CEO/CTO of Global Digital Forensics, discusses the lessons US businesses should take from this type of attack, and the necessity to raise social engineering awareness at every level within an organization to improve cyber security posture. New York, NY (PRWEB) May 31, 2014 With over a billion active users monthly from all around the...

2014-05-30 08:27:08

Two leaders in security drive a coordinated industry effort against cybercrime and cyber criminals SUNNYVALE, Calif. and SANTA CLARA, Calif., May 30, 2014 /PRNewswire/ -- Fortinet (NASDAQ: FTNT) and Palo Alto Networks (NYSE: PANW), leading innovators in network security, have co-founded the industry's first cyber defense consortium. The mission of this consortium is to drive a coordinated industry effort against cybercrime and cyber criminals through deep collaboration on threat intelligence...

iran hacking campaign
2014-05-29 09:25:56

Peter Suciu for redOrbit.com - Your Universe Online Iranian hackers may have been utilizing social media as part of an on-going three year campaign that was aimed at befriending US lawmakers, defense contractors and even a four-star general. The plan was apparently to get close to these individuals and then extract data from them. According to a new report from cyber security firm iSight Partners, the ruse involved more than a dozen fake personas – supposedly working at fake US news...

2014-05-29 08:36:10

EBay's password data breach offers IT professionals an ideal opportunity for reducing their risk by educating clients about the costly dangers of spear phishing. CHICAGO, May 29, 2014 /PRNewswire/ -- TechInsurance, the nation's leading online source of business insurance for small IT firms, announced today that eBay's recent data breach could lead to a spate of "spear phishing" attacks. Unlike traditional phishing scams, spear phishing messages incorporate information hackers gather about the...

2014-05-28 23:06:51

Showcases Real-Life Cyber Scenarios That Can Negatively Impact Federal Agencies Warwick, NY (PRWEB) May 28, 2014 SwishData, a woman-owned group of leading data performance architects for the federal marketplace, today announced the launch of a new online resource called “Cyber Attack Defenders,” which shines a light on the real dangers and realities that federal agencies face when it comes to cyber security. The first video in the campaign called “The Defenders” showcases a...

2014-05-28 23:06:43

TrustDefender™ Cybercrime Protection Platform Recognized for Offering Unified Intelligence with Integrated Cybercrime Protection Platform San Jose, CA (PRWEB) May 28, 2014 ThreatMetrix®, the fastest-growing provider of context-based security and advanced fraud prevention solutions, today announced that the TrustDefender™ Cybercrime Protection Platform won the Judges Choice for Best Overall Fraud/Security Solution at the 2014 CardNotPresent.com (CNP) Awards. The CNP Award for Best...


Word of the Day
cock-a-hoop
  • Exultant; jubilant; triumphant; on the high horse.
  • Tipsy; slightly intoxicated.
This word may come from the phrase 'to set cock on hoop,' or 'to drink festively.' Its origin otherwise is unclear. A theory, according to the Word Detective, is that it's a 'transliteration of the French phrase 'coq a huppe,' meaning a rooster displaying its crest ('huppe') in a pose of proud defiance.' Therefore, 'cock-a-hoop' would 'liken a drunken man to a boastful and aggressive rooster.'
Related