Protective measures needed after legacy root falls out of compliance
Alibaba.com Hit with Widespread Phishing Campaign
The primary method of attack is a random phishing campaign that employs well-crafted spoofing methods.
ProSec Welcomes your Input
Please send us your comments! You can email them directly to Rob @ info@prosecalarm.com.The post ProSec Welcomes your Input first appeared on ProSec Integration, LLC.
Most Federal Agencies Now Use NIST Cybersecurity Framework
A survey has found that 82% of federal IT respondents’ organizations are using the NIST framework to improve their security stance.
A Look at 2015: Cyber-Threats Show Evolution and Growth
Kaspersky Lab says that 2015 has changed the rules of the cybersecurity game.
German Cybercriminals Develop Flourishing Local Black Market
Trend Micro report uncovers some highly localized offerings
Consumers Won’t Shop with Breached Firms – Report
Gemalto study offers food for thought during hectic festive period.
Volume of New Malware Files Drops in 2015
Cybercriminals look elsewhere to get results, says Kaspersky Lab.
Bankers Fear Cybercrime More than Economic Failure
PwC report claims ‘creaking technology’ is no match for determined hackers.
Airline Customers’ Data Exposed by HTTPS Hole – Report
Wandera claims 16 firms have failed to use HTTPS for payment data and PII