Malware targeting mobile devices is still a fraction of all cybercrime, but the threat level is growing, for one type of device in particular.
Security consulting firm NetraGard recently conducted an experiment in which they used a USB mouse to hack into a client’s account. What did they discover? A mouse alone can bring down an entire IT environment.
Even highly trusted websites are capable of being taken over by hackers.
Think data about the number of companies that experience data breaches is frightening? Well, the real numbers may be even worse.
We’re not sure how many big-time Cameron Diaz fans are in your company, but if there are any, you may want to warn them to be especially careful when they search for information about the actress.
Security infrastructure technologies, like firewalls, antivirus apps and management consoles, do a lot to keep hackers off of corporate networks — but they also open up their own holes for attackers.