Executives behaving badly: 5 ways to manage the executive cyberthreat

Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk. When it comes to corporate cybersecurity, leading by example matters. Yes, it’s important for every employee to play their part in a security-by-design culture. But their cues more often than not come from … More Executives behaving badly: 5 ways to manage the executive cyberthreat

New BLUFFS attack lets attackers hijack Bluetooth connections

Researchers at Eurecom have developed six new attacks collectively named ‘BLUFFS’ that can break the secrecy of Bluetooth sessions, allowing for device impersonation and man-in-the-middle (MitM) attacks, writes Bleeping Computer*. Daniele Antonioli, who discovered the attacks, explains that BLUFFS exploits two previously unknown flaws in the Bluetooth standard related to how session keys are derived … More New BLUFFS attack lets attackers hijack Bluetooth connections

Retail at risk: Top threats facing retailers this holiday season

While it may be too late to introduce wholesale changes to your security policies, it doesn’t hurt to take a fresh look at where the biggest threats are and which best practices can help neutralise them. The holiday shopping season has begun in earnest. While retailers are focused on jockeying for an estimated $1.5 trillion in … More Retail at risk: Top threats facing retailers this holiday season

‘Tis the season to be wary: 12 steps to ruin a cybercriminal’s day

The holiday shopping season may be the time to splurge, but it’s a also favorite time of year for cybercriminals to target shoppers with phony deals, phishing scams and other threats. The holiday shopping season is in full swing. It involves a seemingly endless few weeks of shopping mayhem as we rush to take advantage … More ‘Tis the season to be wary: 12 steps to ruin a cybercriminal’s day