article thumbnail

Cyber nonprofits ask billionaire philanthropists to show them some love

SC Magazine

Judge and Golloway told SC Media in a joint interview that while many high-tech and cybersecurity leaders like Microsoft, Google, Trend Micro, Comcast and AT&T have historically been big givers to cyber nonprofits, everyone is competing for the same funds, and there is only so much to go around.

article thumbnail

The Rise of an Overlooked Crime – Cyberstalking

Security Affairs

These evils include hacking, identity theft, online surveillance, and cyberstalking. We all know the dangers associated with hacking, identity theft, and internet surveillance, thanks to Facebook and other social networking platforms. Because of social media, it’s not too difficult to follow you around.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Notification no-nos: What to avoid when alerting customers of a breach

SC Magazine

SC Media asked experts in the field what they believe are some of the biggest unforced errors you can make when it comes to notification no-nos. A simple, pro forma apology, a free comprehensive package of identity theft protection and credit file monitoring, and a public statement weeks or months after the breach is discovered,” said Winick.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

That type of information can be extremely valuable for things like identity theft.”. You can enable root access, but you have to jump through a lot of security hoops just to activate it,” noted Terry Dunlap, CSO and co-founder at ReFirm Labs. Costlow agreed, adding, “Deepfakes are becoming increasingly common.