GDT Webinar Series – How to Fail at Security? Reserve Your Spot

Cybersecurity

newspapers
GDT Security Analysts GDT SOC GDT Security Operations Center
NETFLIX Fake Email
The FTC wants you to know that if you have a Netflix account, you better watch out. They’re not talking about Santa. No, they’ve issued a phishing alert.
cybercriminals malware fraud Icon
It may not attract the attention of Hollywood like jewel heists or the mob, but neither can hold a candle to cybercrime―at least financially.
Q & A for a Q & A

By Richard Arneson Think back to the first time you hopped on the Internet. If you’re under the age of thirty-years-old, it might have been a “meh” moment, if it even registered at all. It was probably lost among the other technological advancements that surrounded your crib. But if you’re

By Richard Arneson Apparently, scammers get bored, too, at least the ones who find it fun and profitable to generate hustles related to cryptocurrency. They’ve found a new target—Facebook. Their scamming medium of choice has primarily been Twitter, which has for months been littered with fake cryptocurrency advertisements. For Facebook,

cryptocurrency

By Richard Arneson It’s been over three (3) years since Google announced that developers could no longer publish applications on Google Play willy-nilly—that is, without their apps having first been vetted. But that vetting process is largely handled like it is on Apple’s App store—manually. Yes, people are their main

FTC's findings

By Richard Arneson By now, most of us are aware that cyber threats don’t discriminate. Any business, regardless of size, industry, location, et al., is a potential target. The media, of course, is going to focus on breaches that affect huge, public-facing, high-profile corporations whose names are recognizable (Target, Uber,

Choosing options

By Richard Arneson The midterms are over, most of the concession speeches have been grudgingly made, which thankfully means no more yard signs or unwanted texts from candidates, and no longer having to hear “This message has been approved by…” at the end of competitor-bashing ads. But now it’s time

Network security

By Richard Arneson If you’ve never seen video of it, it’s happened a few times. Two pugilists—in this case MMA fighters—knock each other out simultaneously. You can see it for yourself, it’s good for a chuckle—go 35 seconds in—https://www.youtube.com/watch?v=keZLvsXs-sQ.This is exactly what you’d like to see when two (2) botnets