security

identity fraud

How identity fraudsters operate

A notorious cyberthief turned security consultant walks us through the “synthetic identity fraud” process, from searching the Dark Web to pulling credit reports to opening accounts.
zero day

Primer: What’s a zero-day?

They’re key to advanced persistent threats. They’re increasingly simple. And they’re called zero-days because there’s essentially no time to patch them before a potential cybercriminal exploit.
APT

Primer: What’s in an APT

“No one is immune” to advanced persistent threats, or APTs, which hackers use to surreptitiously gain access to a network and stay undetected for a long period of time.