Social Engineering

What hackers do: their motivations and their malware

Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.

Data Privacy: How you can mitigate violation

In this edition of Explained, we explore the serious need for users to be vigilant and vary while giving away their personal data, post the Aadhaar breach and Facebook-Cambridge Analytica expose.

 

Script edited by Shantheri Mallaya

Post production by Kshitish

Voice Over by Soumik Ghosh

 

Trend Micro detects and blocks 3.4mn high-risk email threats in 2017

Cloud App Security managed to detect over 50,000 ransomware and 3,000 BEC threats in the last three quarters of 2017.

Six myths CEOs believe about security

Want a more effective IT security strategy? Dispel your CEO and senior management of these common cybersecurity misconceptions.

The future of computer security is machine vs machine

Better security automation at the OS level and via cloud services will force hackers to respond in kind.

Is your defensive security data-driven?

Data-driven defense uses an organization's own data to identify and mitigate the most important threats. Sounds good, but adoption will be met with resistance.

Fortinet delivers third generation of network security with the evolution of its security fabric

FortiOS 6.0 delivers more than 200 new capabilities across Security Fabric to automate security operations and protect the digital attack surface

Reaper emerges a cyber security threat for global enterprises

APT37, popularly known as Reaper has been primarily targeting the chemicals, electronics, manufacturing, aerospace, automotive, and healthcare industries for North Korean state interests.

The two most important ways to defend against security threats

Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.

Cyber scammers targeting real estate sector: researcher

Cyber scammers have figured out that the Australian real estate industry is a potential gold mine for social engineering attacks, according to Alex Tilley, a senior security researcher at SecureWorks.

BFSI sector will be the key target of cyber criminals in 2018

BFSI companies were possibly the biggest target of cyber criminals over the last couple of years. The trend is likely to continue as cyber criminals will continue to find innovative ways to steal identity and money.

The changing role of the CISO

The role of a Chief Information Security Officer (CISO) is changing from that of an IT security manager to that of a C-suite executive who secures the business interests of the enterprise.