By Alistair Paterson:
Credit card fraud has been big business for quite some time with losses expected to reach $24 billion by 2018. There are two types of credit card fraud – physical card fraud which involves the cloning of credit cards and Card Not Present (CNP) fraud, when the card is used online and over the
Nationwide’s annual survey of business owners found that 13 percent said they experienced a cyberattack.
However, that number jumped to 58 percent of owners who identified as victims when shown a list of the following types of attacks — revealing a 45 percent gap and lack of understanding about what constitutes an actual attack.
It's 2017, and opening a simple MS Word file could compromise your system.
Security researchers are warning of a new in-the-wild attack that silently installs malware on fully-patched computers by exploiting a serious — and yet unpatched — zero-day vulnerability in all current versions of Microsoft Office on fully-patched PCs.
The Microsoft Office zero-day attack, uncovered
Angel L. Hueca, Karla Clarke, Yair levy:
Cyber exploitation and malicious activities have become more sophisticated. Insider threat is
one of the most significant cybersecurity threat vector, while posing a great concern to
corporations and governments. An overview of the fundamental motivating forces and motivation
theory are discussed. Such overview is provided to identify motivations that lead trusted