You searched for identity management/ | SC Media

Your search for identity management/ returned 26 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Post remove
Cybercrime remove

Your search for identity management/ returned 26 results

Sort Results:

Relevant Recent
SC Awards 2017 finalists
2017 SC Awards Finalists

SC Awards Finalists 2017 Round Three

Best Computer Forensic Solution, Best Identity Management Solution, Best NAC Solution, Best Behavior Analytics/Enterprise Threat Detection, Best Regulatory Compliance Solution,
Cybercrime, Malware, Mobile Security, Phishing, Security News

Spyware disguised as Spanish banking apps removed from Google Play

A spyware program fraudulently disguised as a Spanish-language banking app was found last month collecting users’ device data and messages, which were later leveraged in smishing schemes. Advertised as “Movil Secure,” the fake app pretends to be associated with multinational Spanish banking group Banco Bilbao Vizcaya Argentaria (BBVA). Published on Oct. 19, the app was discovered by Trend…
Security News

Report: ATM fraud on the rise

A report issued this week found that 10 percent of all credit and debit card fraud victims had cash withdrawn from their accounts via ATM transactions.
Iranian hackers targeting critical infrastructure

Russian DragonFly hackers accessed electrical utilities control rooms in lengthy campaign

The Russian DragonFly APT group, which last year broke into air-gapped networks run by U.S. electric utilities in a likely ongoing campaign that victimized hundreds, accessed the providers’ control rooms where they could have caused blackouts and other damage. The group, which also goes by Energetic Bear, used phishing and waterhole attacks to gain access…

DNC spurns hack on voter database

The Democratic National Committee foiled an attempted spearphishing attack aimed at hacking its voter database hosted on Votebuilder after receiving an alert Tuesday from security firm Lookout. The would-be attackers had created a fake login page in an attempt to snag credentials that could be used to access the database. “Lookout’s phishing AI detection discovered…

The case for making all accounts privileged

When we think of privileged accounts, we think of Unix root accounts or Windows domain admins. We think of database administrator accounts, service accounts, shared accounts, and so on. But we should treat every account as a privileged account.
Next post in Perspectives