Quantcast
Channel: The Business-Technology Weave » cybercrime
Browsing all 9 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cybercrime: Alert to small and mid-sized organizations

  As regular readers know, I frequently consult with and counsel small-to-medium businesses (SMB).  I also work with non-profits, volunteer groups, and sole-proprietorships.  A specific warning is...

View Article



Image may be NSFW.
Clik here to view.

New Year, New Tricks… Old Standby: Cyber-crime

As we enter 2013, many of us are excited by new projects, new enablements, and an expansion of systems and related capabilities.  I always feel a sunny optimism when embarking on projects, and I...

View Article

Image may be NSFW.
Clik here to view.

Cyber-crime: Awareness for 2013… and beyond…

In continuing from yesterday, let’s examine cyber-crime in a bit more detail.  Before we get into the actual mechanics of intrusions and rip-offs, let’s fully understand the true perils inherent in...

View Article

Image may be NSFW.
Clik here to view.

Cyber-crime Continued: Attacks’ methodology

No matter the nefarious goal of attack, subsequent entry, and exploitation, (such as those mentioned in articles below), there are basic steps for breaking your defenses, and taking advantage of the...

View Article

Image may be NSFW.
Clik here to view.

Malware: Insertion and Types

In continuing our awareness for cyber-crime, recognize that after an entity penetrates a network for access, far more than an episodic outcome can occur (such as a one-time theft of data or money, for...

View Article


Image may be NSFW.
Clik here to view.

Cyberwar: A consideration for business protections?

Hey, don’t blame me; no fan of war, I.  But people are actually speculating on the nature of the next big war. Of course, there’s the nuclear component, and concomitant fear.  But hopefully the MAD...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity – The local impact… inside and out

The other day, in the article Cyberwar:  A consideration for business protections?, we asked a few questions vis-à-vis cyberwarfare: Outside:  What are the modern organization’s possible contributions...

View Article

Image may be NSFW.
Clik here to view.

Cyberwar Between Business Competitors – This blog’s prediction come true?

It’s just been reported that Burger King’s Twitter feed was hacked.  The Burger King logo was replaced with McDonald’s golden arches logo. Further, a tweet indicated that “the whopper flopped” and that...

View Article


Image may be NSFW.
Clik here to view.

Cyber Awareness: Personal Security

People have been asking me what they can do for their home environments, and related cyber security – some tips are provided below. First, recognize that social engineering is the biggest factor in...

View Article

Browsing all 9 articles
Browse latest View live




Latest Images