Profile cover photo
Profile photo
Maria Korolov
876 followers -
Freelance business and technology journalist focusing on immersive virtual environments.
Freelance business and technology journalist focusing on immersive virtual environments.

876 followers
About
Maria's posts

Post has attachment
When it comes to issuing credentials to employees, government agencies benefit from an additional authentication step that is not well appreciated: At some point in the hiring process, a trusted human resources manager or supervisor physically meets with…

Post has attachment
.In the federal government, Common Access Cards and personal identity verification cards for employees and contractors incorporate biometrics and give agencies a better foundation for security and ID management than many private-sector organizations…

Post has attachment
Understanding the encryption options

When it comes to protecting data, it’s rarely as simple as “encrypt it all, all the time” Read full article at FCW

Post has attachment
A new botnet is helping cybercriminals phish for community bank customers Computer hackers typically cast their phishing nets expecting to hook megabank customers. After all, the overwhelming odds are that the most computers infected by random phishing…

Post has attachment
By now you know that hackers calling themselves “Guardians of Peace” went through Sony Pictures Entertainment like a hot knife through butter. They collected everything—high-quality copies of unreleased films, employee passwords, emails, salary numbers,…

Post has attachment
A readiness checklist for meeting the upcoming Windows Server 2003 replacement deadline Microsoft Corp. will end technical security support for its popular Windows Server 2003 operating system in July—and community banks should start making their upgrade…

Post has attachment
Five steps for sustaining rigorous network security against constant cyberattacks Hackers are using sophisticated, automated tools to cast a wider net than ever before. Even small and medium-size community banks need to continually review their security…

Post has attachment
It’s called ATM cash-out fraud, and it’s a new data security threat where physical attacks and cyberattacks converge. Earlier this year, federal regulators warned financial institutions against criminal attacks on their ATM systems. But instead of…

Post has attachment
Apple Inc.’s rollout of its Apple Pay mobile payments app has been fraught with expensive card payment fraud, according to news reports. The much-vaunted iPhone tap-and-pay system’s state-of-the-art tokenization payment security is working fine. But a…

Post has attachment
Consumer devices are the most vulnerable point for bank cyberattacks By Maria Korolov Cybercriminals who attack banks are more likely to focus on their online customers, according to the latest Verizon Data Breach Investigations Report. End-user devices…
Wait while more posts are being loaded