Nigerian bank falls victim to $40 million insider cyber-heist

Nigerian police are on the hunt for an IT staffer at Skye Bank who hacked into the bank’s systems and transferred $40 million to a raft of bogus accounts before going on the run. Thirty-eight year old Isoko resident Godswill Oyegwa Uyoyou is alleged to have conspired with a criminal gang to access the bank’s computer system and inflate the balances of various accounts.

via https://ift.tt/1qEJUey

Run Trend Micro’s Anti-Threat Toolkit as a second opinion scanner

I like to run second opinion scanners from time to time on computer systems to make sure that no malware or other unwanted software has slipped by the primary defenses running on those PCs. While that is the case, I don’t have have a preference for a tool that I run in this case but […]

The post Run Trend Micro’s Anti-Threat Toolkit as a second opinion scanner appeared first on gHacks Technology News.

via https://ift.tt/XoIeJD

CVE-2014-4784

NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance .

via https://ift.tt/1pagzlP

Why some Chrome extensions use memory all the time

You know probably that Google Chrome is supporting extensions just like Firefox or the Opera browser. Extensions add functionality to the browser or modify the default behavior which can be quite useful at times. From ad blocking to scanning web pages or sharing information you come across. When you check the Chrome Task Manager, you […]

The post Why some Chrome extensions use memory all the time appeared first on gHacks Technology News.

via https://ift.tt/WY8dHr

ISACA launches COBIT 5 online

ISACA launched the online version of COBIT 5, a resource center to improve governance and management of enterprise IT. The new online platform helps increase the utility of the COBIT 5 framework, a bu…

via https://ift.tt/1CLYswO