Blog

September 22, 2014
Comments [0]

Former employees of Home Depot said they voiced their criticism of the company's security vulnerabilities years before its massive data breach, but the company did not respond quickly enough, ...

Read More
September 19, 2014
Comments [0]

When he was a master identity thief in the 1960s, Frank Abagnale said he used to make his own fraudulent ID cards and forge checks, according to his interview with ...

Read More
September 15, 2014
Comments [0]

Rather than setting their sights on computers, cybercriminals are increasingly targeting point of sale systems to steal valuable customer information. With attacks against in-store systems growing, the payment industry is fighting back. The Payment Card Industry Security Standards Council (PCI SSC) recently overhauled its...

Read More
September 12, 2014
Comments [0]

While consumers are tired of being bombarded with ads every day, a more dangerous threat could be lurking in the background on webpages and their personal devices. Malicious advertising, also known as malvertising, is an emerging way cybercriminals are infecting new computers with malware,...

Read More
September 8, 2014
Comments [0]

When the federal health insurance marketplace HealthCare.gov was launched in October 2013, IT security experts were concerned about the potential for data breaches and other security glitches. Now their fears might be realized after government officials said the site experienced a breach that was detected on Aug....

Read More
September 2, 2014
Comments [0]

With more consumers using cloud services to upload pictures, documents and more, cybercriminals are infiltrating cloud accounts to steal valuable information. Hackers managed to access sensitive photos from celebrities' personal iCloud accounts and shared them with other Internet users,...

Read More
August 28, 2014
Comments [0]

Cybercriminals have different motivations to hack into protected systems, from taking bank information to sell in underground markets to stealing intellectual property to make another nation more competitive in the global market. Hackers can also be driven to infiltrate companies for political purposes. Recently,...

Read More
August 25, 2014
Comments [0]

While companies can spend millions on their IT security systems to prevent cyberattacks and other common security risks, they may be fighting a losing battle if their worst enemy already has the password and unrestricted access to their systems. While detecting breaches and other security events from external causes ...

Read More
August 21, 2014
Comments [0]

In the aftermath of the Heartbleed Bug's discovery, the security flaw continues to spark security concerns. The Heartbleed Bug was revealed in many of the world's most popular sites in April, and Internet users were shocked at its scope. From retail sites to social networks, it seemed as though no Internet giant...

Read More
August 19, 2014
Comments [0]

With cyber-related threats increasing as criminals find new ways to infiltrate computer and mobile systems, businesses and consumers might find themselves vulnerable to the rippling economic impact of cyberattacks. A company on average spent $3.5 million to respond to a data breach - a rise of 15 percent compared...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started