Tara Seals, Infosecurity

Tara Seals

Infosecurity

Florence, MA, United States

Contact Tara

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • Infosecurity

Past articles by Tara:

70% of Energy IT Pros Fear 'Catastrophic Failure' from Cyber-Attacks

97%\ are concerned that attacks could cause operational shutdowns, and 96% believe they could impact the safety of their employees. → Read More

Cryptominers Replace Ransomware as No. 1 Threat

The surge in cryptominers started after the price of Bitcoin skyrocketed to $20,000. → Read More

ISACA: Gender Disparity in Cyber Persists

A 31-point perception gap exists between male and female respondents, with 82% of men saying women have equal opportunities. → Read More

Facebook, Microsoft and 32 Others Form Cyber Consortium

The group pledges to design offerings that prioritize security and privacy, commit to better user education and collaborate on info sharing. → Read More

A Pair of Mobile Apps in Google Play Target Mideast Victims

ViperRAT 2.0 and Desert Scorpion represent a rare instance of a malicious APT in an official app marketplace. → Read More

Most Web Apps Contain High-Severity Vulnerabilities

High-severity vulnerabilities were found in 100% of tested banking and finance web applications. → Read More

University of Virginia Nabs Top Honors in Collegiate Cyber Contest

Ten cyber-defense teams faced off in Orlando, competing as white-hat hackers to protect a fictional biotech company called Volitech. → Read More

Early Bird Code Injection Gets the Obfuscation Worm

Early Bird allows execution of malicious code before the entry point of a process, bypassing security products. → Read More

Scammers Bank on Cryptocurrency with Fake Apps

Fake cryptocurrency apps in the mobile app ecosystem exploit the names of well-known exchanges and mixers. → Read More

Cybercriminals Earn Millions, And Spend It Wildly

Some spend their money like legitimate earners typically do, but others tend to blow it on fast cars, hookers and drugs. → Read More

Nation-State Attacks Take 500% Longer to Find

In 50% of cases over the past 12 months, organizations had insufficient endpoint or network visibility to respond successfully. → Read More

Google Will Distrust Additional CAs, IT Pros Predict

Just 15% of respondents believe that Google's decision to distrust Symantec certificates is a one-time event. → Read More

UK Launches Offensive Cyber-Weapons Against Islamic State

This marks the first time the UK has systematically and persistently attacked an adversary’s online efforts as part of a wider military campaign. → Read More

Orgs Are Holding Back on Cloud-Based Security

Enterprises are adopting the cloud much faster than their security teams can keep up with – and misunderstanding about cloud environments is pervasive. → Read More

Organizations Failing at Timely Detection of Threats

More than two-thirds of organizations said that even if they detected a major incident, they would be unable to contain it within that same time frame. → Read More

Brazilian Criminals Use HTTP Injectors to Gain Free Mobile Internet Access

The injectors modify HTTP headers on network requests with malicious code; the code then tricks captive portals into connecting to the internet. → Read More

17% of Workers Fall for Social Engineering Attacks

More than a quarter (27%) of recipients clicked the link in mock phishing mails. → Read More

Fraudsters Are Stealing Corporate Funds with Tampered Debit Cards

An elaborate fraud is bent on draining the bank accounts of large corporations. → Read More

Raróg Crypto-Miner Allows Affordable Criminality

It mines unsuspecting victim machines for Monero and other virtual currencies, but its most unusual characteristic is how cheap it is. → Read More

One-Fifth of Open-Source Serverless Apps Have Critical Vulnerabilities

According to PureSec's audit, most vulnerabilities and weaknesses were caused by human error. → Read More