Remove 2014 Remove Information Security Remove Malware Remove Security
article thumbnail

UPS Data Breach

CTOvision

The compromise of Target’s systems and the resulting media coverage cost the corporation hundreds of millions of dollars in the first half of 2014, and the repercussions are far from over. Sensitive information at eBay was recently compromised as well, and the re. To read more please log in.

Data 255
article thumbnail

Invincea Announces 54 New Enterprise Customers for Its Flagship Enterprise Solution, $8.1M in Advanced Research Contracts for Its Labs Division

CTOvision

FAIRFAX, VA—April 7, 2014 —Invincea, Inc., In the first quarter of 2014, the company’s advanced research division—Invincea Labs—secured $8.1M At the RSA Conference in February 2014, the company announced threat intelligence partnerships with ThreatGRID and Reversing Labs. “A contract with the U.S.

CTO Hire 255
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Home Depot Data Breach Settlement: 5 Things It Must Do Now

SecureWorld News

The Home Depot recently reached a multi-state agreement which settles an investigation into a 2014 data breach. The data breach compromised payment card information of roughly 40 million customers. In 2014, hackers accessed the company's network and installed malware to the self-checkout point-of-sale system. Of the $17.5

Data 57
article thumbnail

Invincea Names Former Verizon Terremark CISO as Chief Operating Officer

CTOvision

Norm Laudermilch Brings 25 Years of Technical and Executive Experience Spanning Fortune 50 Companies and Security Startups. GARTNER SECURITY & RISK MANAGEMENT SUMMIT, NATIONAL HARBOR, MD —June 23, 2014 – Invincea, Inc., Before joining Terremark, Laudermilch was CTO of mobile security provider, Trust Digital.

Symantec 266
article thumbnail

Global Effort Seizes EMOTET Botnet

SecureWorld News

In 2014, it was first found to be a banking Trojan, but quickly evolved into a perfect solution for cybercriminals everywhere. Europol says the EMOTET group was able to take email as an attack vector to the next level: "Through a fully automated process, EMOTET malware was delivered to the victims’ computers via infected e-mail attachments.

Malware 52
article thumbnail

Common Techniques Hackers Use to Penetrate Systems and How to Protect Your Organization

ForAllSecure

Common Types of Cyber Attacks Common techniques that criminal hackers use to penetrate systems include social engineering, password attacks, malware, and exploitation of software vulnerabilities. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.”

System 40
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

And I was really fortunate to land the security beat right away. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. What if you are a woman in information security? WANG : it was the security security practice. By accident. So I learned.