Subscribe: Forbes.com: Security
http://www.forbes.com/security/index.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
cyber security  cyber  cybersecurity  data  digital  email security  email  fake  fraud  hackers  internet  mimecast  new  security 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Forbes.com: Security

Forbes - Security



Forbes - Security



Copyright: Copyright 2017 Forbes LLC
 



Scam Alert: Anatomy Of An Inheritance Fraud Letter

Sun, 19 Feb 2017 12:41:00 -0500

We got a letter in the mail the other day saying my wife inherited $7 million. Here's how I could tell it was a scam in a heartbeat.


Media Files:
https://specials-images.forbesimg.com/imageserve/577080001/0x600.jpg?fit=scale




Bill Gates Warns Of Epidemic That Will Kill Over 30 Million People

Sun, 19 Feb 2017 00:40:00 -0500

"There is a reasonable probability the world will experience such an outbreak in the next 10 to 15 years."


Media Files:
https://specials-images.forbesimg.com/imageserve/625138372/0x600.jpg?fit=scale




Real/Fake Digital Media: Time For Us All To Worry And For Technologists To Act

Fri, 17 Feb 2017 17:38:00 -0500

Fake news is pervasive. What should technologists do to solve the problem? Real-time digital fact-checkers, broadcast and publishing delays and funding independent media are three ways we can address the problem.


Media Files:
https://specials-images.forbesimg.com/imageserve/581079085/0x600.jpg?fit=scale




Anonymous Browsing Data Isn't As Anonymous As You Think

Fri, 17 Feb 2017 08:30:00 -0500

You're supposed to take comfort in the fact that the browsing data that online advertisers collect about you is generally de-personalized before they get their hands on it. Unfortunately, it's not very hard to identify you based on that anonymized information.


Media Files:
https://blogs-images.forbes.com/leemathews/files/2016/11/facebook-laptop.jpg?width=0&height=600




How Two Security Pros Turned The Tables On A Nigerian Scam Operation

Thu, 16 Feb 2017 11:02:00 -0500

Getting caught up in a phishing scam is a very bad thing, at least to the average Internet user. For security researchers, though, it's an opportunity to launch a counterattack.


Media Files:
https://blogs-images.forbes.com/leemathews/files/2016/11/gmail.jpg?width=0&height=600




DNC Hackers Are Using Apple Mac Spyware Code From FBI Surveillance Vendor, Claims Ex-NSA Researcher

Thu, 16 Feb 2017 11:00:00 -0500

Ex-NSA staffer is "100 per cent" sure Russia either borrowed or bought Hacking Team's malicious code.


Media Files:
https://specials-images.forbesimg.com/imageserve/cc427cf79ea141eeaac75ed4d72fc176/0x600.jpg?fit=scale




Privacy Versus Security: How Americans View The Issue Of Encryption [Infographic]

Thu, 16 Feb 2017 06:00:00 -0500

Should the government be able to gain access to encrypted communications when investigating criminal activity? Should tech companies refuse to give the government access based on principle? Does that principle put us in danger? Once again we are looking at the issue of security vs privacy.


Media Files:
https://blogs-images.forbes.com/kevinanderton/files/2017/02/EncryptionWebTease-500x500.jpg?width=0&height=600




Meet The 'Cowboys Of Creepware' -- Selling Government-Grade Surveillance To Spy On Your Spouse

Thu, 16 Feb 2017 05:55:00 -0500

Spyware dealers are shipping the same powerful surveillance code to governments and jealous spouses, a FORBES investigation finds. Lawmakers and lawyers think they should be prosecuted.


Media Files:
https://blogs-images.forbes.com/thomasbrewster/files/2017/02/Screen-Shot-2017-02-11-at-10.23.02-1200x761.jpg?width=0&height=600




Inside OilRig -- Tracking Iran's Busiest Hacker Crew On Its Global Rampage

Wed, 15 Feb 2017 12:00:00 -0500

Meet OilRig, Iran's busiest hacker crew. Its victims include an American company that helps visually impaired people, and many major Middle East companies.


Media Files:
https://specials-images.forbesimg.com/imageserve/12a9e701bd644f90aef8e7fd86f88354/0x600.jpg?fit=scale




A Digital Geneva Convention? A Great Idea.

Wed, 15 Feb 2017 11:30:00 -0500

Microsoft's president Brad Smith this week called for a "Digital Geneva Convention" to cooperate and protect citizens from cyber attack. Eugene Kaspersky believes this is a long time coming.


Media Files:
https://specials-images.forbesimg.com/imageserve/626737614/0x600.jpg?fit=scale




Mac Malware Attacks Tied To Russian Spy Group That Hacked DNC

Wed, 15 Feb 2017 10:00:00 -0500

Two security firms have spotted a new malware strain that targets Mac systems. They believe that the group behind it is the same team of Russian hackers blamed for tampering with the 2016 Presidential election.


Media Files:
https://blogs-images.forbes.com/leemathews/files/2017/02/imac.jpg?width=0&height=600




The Key To Cybersecurity: Shared Intelligence And Industry Cooperation

Wed, 15 Feb 2017 09:00:00 -0500

Hackers fight dirty. But that doesn't mean you have to.



E-Commerce Merchants Can Get Card Transactions Guaranteed

Tue, 14 Feb 2017 15:34:00 -0500

Card not present fraud (CNP) online is a growing problem, especially as EMV chips discourage fraud at point of sale. Machine learning and AI are being used to combat it and still approve good transactions.


Media Files:
https://blogs-images.forbes.com/tomgroenfeldt/files/2017/02/card-300x182.jpg?width=0&height=600




Bots And IoT Devices Raise Hacking Risks: Here's How To Protect Yourself

Tue, 14 Feb 2017 14:05:00 -0500

As conversational bots become more ubiquitous in our lives, we need to understand how to protect ourselves to keep our conversations safe from hackers.



How To Build A Cybersecurity Strategy For 2017

Tue, 14 Feb 2017 12:46:00 -0500

In a rapidly changing technology landscape, the mindful decentralization of your organization’s security controls becomes an asset. This allows for a more customized approach to security in the face of new technologies and more vectors over which you have less control.


Media Files:
https://specials-images.forbesimg.com/imageserve/630980344/0x600.jpg?fit=scale




The Cyberattacks We Don't Hear About But Should

Tue, 14 Feb 2017 11:15:00 -0500

We typically hear about data security breaches when they pertain to customer data. But breaches of corporate data are not well covered or understood.



When Did Young Tech Workers Become The Enemy In San Francisco?

Tue, 14 Feb 2017 10:40:00 -0500

Over the past few years, tech workers have been blamed not only for the city’s worsening traffic congestion and sky-high housing prices, but also for undermining the city’s bohemian culture and leftist politics through their focus on commerce and money. Here's why the criticism rings false.


Media Files:
https://specials-images.forbesimg.com/imageserve/35024480/0x600.jpg?fit=scale




Top CIO Concerns & Worries for 2017 - IT's Déjà vu All Over AGAIN! (Part 2)

Tue, 14 Feb 2017 10:37:00 -0500

The annual SIM survey repeats findings from the past several years. The new priorities -- like security, the cloud and innovation -- are under-emphasized by survey respondents. It's time to radically change the organization and structure of technology.



Here's Everything You Need To Tell Your Kids About Internet Responsibility

Tue, 14 Feb 2017 08:54:00 -0500

There is no one correct way to teach your children about internet safety. The opportunities are many, and so are the dangers. But when you find yourself without a clue, a little guidance can go a long way towards raising your kids internet responsible.


Media Files:
https://specials-images.forbesimg.com/imageserve/572614342/0x600.jpg?fit=scale




This Fake Femme Fatale Is Stealing Google Accounts From Journalists And Human Rights Activists

Tue, 14 Feb 2017 08:00:00 -0500

Meet Safeena Malik, a fake persona set up to spy on Google accounts of activists and journalists working on migrant worker rights issues in Qatar.


Media Files:
https://blogs-images.forbes.com/thomasbrewster/files/2017/02/Screen-Shot-2017-02-11-at-10.48.04-1200x689.jpg?width=0&height=600




Exclusive: Mimecast Report Indicates Company Email Security Systems Fail To Stop Dangerous Email

Tue, 14 Feb 2017 08:00:00 -0500

Mimecast carried out an email security risk assessment on over 26 million emails and found that roughly 13% of the emails that were deemed safe by a company's email security system should have been blocked. Some of the problem emails contained serious security threats.



Exclusive: Mimecast Report Indicates Cybersecurity Lags Behind Both Perceived Threat And Real Damage

Tue, 14 Feb 2017 08:00:00 -0500

A survey conducted by Mimecast in partnership with Vanson Bourne indicates that many organizations are unprepared to meet email-based cybersecurity threats even though they have been damaged by cyber attacks and expect those attacks to increase in the future.



Many Americans Are Experiencing Cybersecurity Breaches [Infographic]

Tue, 14 Feb 2017 06:00:00 -0500

The majority of Americans have experienced some kind of data theft or fraud. Our bank accounts, credit cards, tax information, loans, credit rating, investments, and more could be in jeopardy. We are worried that we are losing control of our private information.



HPE Beefs Up Network Security With Niara Acquisition

Mon, 13 Feb 2017 19:25:00 -0500

With the acquisition of Niara, HPE is bolstering its security portfolio. With the growth of cybercrime and network compromises, this purchase represents a smart move, as the more comprehensive security capability will bring more value to businesses.


Media Files:
https://blogs-images.forbes.com/patrickmoorhead/files/2017/02/new-niara-logo-300x73.jpg?width=0&height=600




Why You Shouldn't Fear This New Android Malware That Wants To Rob You Blind

Mon, 13 Feb 2017 16:00:00 -0500

There's another nasty piece of Android malware making the rounds. It's called Marcher, and it's out to empty your bank account. You probably don't have anything to be worried about, however.


Media Files:
https://blogs-images.forbes.com/leemathews/files/2017/02/android.jpg?width=0&height=600




China Reveals More Details on Its Impending Cyber Security Law

Mon, 13 Feb 2017 14:06:00 -0500

With the impending summer effective date of China’s Cyber Security Law (the Law), the Cyber Administration of China (the CAC) issued clarifying draft “Inspection Measures on Network Products and Services” (the Draft, available here) on February 4, 2017.



IBM Turns Watson Into A Cybersecurity Weapon Amid White House Interest

Mon, 13 Feb 2017 12:51:00 -0500

IBM is turning its Watson cognitive computing tools to cyber security right as industry experts await potential changes from an interest in cyber signaled by the administration of President Donald Trump. Watson's cyber move follows an earlier push into healthcare.


Media Files:
https://blogs-images.forbes.com/alexkonrad/files/2017/02/462665.jpg?width=0&height=600







Uber Rider Sues For $47M After Wife Caught Him Cheating In The App

Mon, 13 Feb 2017 11:10:00 -0500

A French Uber patron is taking the company to court for allegedly spilling the beans on his riding habits.


Media Files:
https://blogs-images.forbes.com/janetwburns/files/2017/02/uber1-1200x797.jpg?width=0&height=600




UK's Proposed Espionage Act Treats Journalists As Foreign Spies

Mon, 13 Feb 2017 09:05:00 -0500

In a series of measures designed to lock the stable door after the horse has bolted, the Conservative government appears determined to stop any future Snowden-style leaks - whatever it takes.


Media Files:
https://specials-images.forbesimg.com/imageserve/478162306/0x600.jpg?fit=scale