Security is one of the most critical elements of our data centers’ DNA. With dozens of data centers globally, security operations means managing a massively complex network. Follow Stephanie Wong, as she journeys to the core of a data center, to show you the six layers of physical security designed to thwart unauthorized access. She’ll meet experts along the way to explore the inner workings of the technology and systems that make Google Cloud one of the most robust enterprise risk management platforms.
Continue ReadingIdentity Management
The Hidden World Of Non-Consensual Videos
These private and intimate images are uploaded and shared on the Internet without consent, invading privacy and destroying lives.
Continue ReadingUnited Kingdom Modern 419 Scam
Modern online romance scams are premeditated, organised crimes that steal millions potentially billions of dollars from vulnerable, lonely people over the internet.
Continue ReadingCasanova Conman Social Engineering
Hamish McLaren may be Australia’s greatest ever conman he stole women’s hearts and then their life savings, and stashed $70 million away somewhere in the world. So who the hell is Hamish and how did they bring him down?
Continue ReadingIdentity Management
Identity Management Features and articles that focus on the way that security leaders identify individuals in their enterprises and control their access to particular areas.
Continue ReadingAccess Management
Access Management Information related to the system that enables a security leader to control access to areas and resources in their enterprise.
Continue ReadingSecurity Magazine
Security magazine provides security industry news and trends on video surveillance, cyber security, physical security, security guards, access management and more for security executives and the security industry.
Continue ReadingPassword – WeLiveSecurity
Password – WeLiveSecurity News, views, and insight from the ESET security community
Continue ReadingInternet of Things Security
Ken Munro shows us how insecure Internet of Things products are and how easy it is to hack them.
Continue ReadingNew Bank Scam
The CyberGuy Kurt Knutsson on the sophisticated bank scams taking advantage of consumers and apps with subscription models built in charging users hundreds of dollars.
Continue ReadingJamtara’s Credit Card Scammers
Jamtara has been the centre for credit card scams in India. In just 2019, 107 phishing scammers were arrested from Jamtara for stealing from unsuspecting victims.
Here’s the fascinating (true!) story of the brewing cyber crime from the people of Jamtara themselves.
Catch the con artists pulling-off phishing scams in the crime-thriller Jamtara, now streaming on Netflix.
Continue ReadingIdentity Theft
It starts with what sounds like a promising phone call: For a one-time fee, you can lower the interest rate on your credit card. But the person on the other end of the line isn’t with your bank or credit card company — and what that person is really after is your identity.
We obtain a database of names of people who have had their identities stolen through this scam, and inform them about the breach. And we talk to experts and a former fraudster who tell us how you can protect your personal information, including testing whether Equifax and TransUnion are doing enough to protect you.
Continue ReadingCredit Card Scammers on the Dark Web
Credit card fraud has been on the rise for about a decade. In 2016 alone, losses topped $24 billion worldwide, half of which affected cardholders in the US.
Continue Reading