Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS One of the things that amazes me the most is how the general population lacks a firm understanding of the cyber threats they face daily. Since few people outside of security circles have actually been trained in cyber security, the general lack...
Year: 2016
Data related to major sporting events vulnerable to hacking
Some major sporting events and tournaments are scheduled to take place this year making these events and sensitive data related to the teams participating vulnerable to hacking, according to cyber security researchers. The recent dependency of sport teams, organisations and tournament hosts on mobile, cloud and analytics, make them easy...
Unsung cybersecurity vulnerabilities in US infrastructure and utilities
This past May, the Internet was abuzz about a report by the Government Accountability Office (GAO) highlighting a number of outdated “legacy systems” still in use across the U.S. government. According to the report, “The Strategic Automated Command and Control System coordinates the operational functions of the United States’ nuclear...
Wendy’s: Credit card numbers disclosed in cyber attack
Fast-food chain Wendy's said Thursday that customers' personal information was compromised in a series of cyber attacks that started last year. Wendy's, which has been investigating "unusual payment-card activity" since early this year, said that cardholder names, credit or debit card numbers and expiration dates are among data targeted in...
The Fully Aware, Hybrid-Cloud Approach
For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another...
Liar, liar, email on fire: the security value of lie detecting algorithms
Researchers have developed a method of identifying linguistic clues in electronic communications that could point to possible cases of deception. Could lie-detecting algorithms reduce the impact of phishing emails?





