News

Subscribe

Contributors

About

4iQ is an identity intelligence company on a mission to empower intel analysts, security researchers, and criminal investigators with capabilities to discover, uncover, and disrupt adversaries. The 4iQ IDLake™ archives more than 14 billion identity records collected from open sources on the deep and dark web from breaches and other open sources. It powers, 4iQ IDHunt, a pioneering identity intelligence and attribution analysis solution used by Fraud Investigation Units, Anti-Money Laundering and Financial Crime Intel Units, and advanced Security Operations Centers. The 4iQ IDLake™ also powers 4iQ IDTheft, used by some of the largest Identity Theft Protection service providers to alert millions of consumers of exposed personal information. 4iQ is headquartered in Los Altos, CA and backed by Forgepoint Capital, C5 Capital, Adara Ventures, and Benhamou Global Ventures.

Contact

Statistics

Posts: 221
Reposts: 0

0 1 10

4iQ is the best cyber security startup in Spain

Spain has a long and illustrious history of creating high tech cyber security startups. The local publication "Actualidad Economica" has...

Read More…
unknownx500

0 0 7

How can tax software cause such cyber-damage?

As more details emerge of the damage done by the recent Petya attack, experts are pointing the finger at the MEDoc tax-filing software....

Read More…
unknownx500

0 0 11

Data has become our lifeline - Petya wreaks havoc

Last year ransomeware grew 167 times the level of the year before... looks like this year will set new records.. 

The attack should not have been a shock. As data has become our lifeline, cybercriminals have elevated their game and their demands. Just...…

Read More…
unknownx500

0 1 1

Should you pay a ransomware demand?

As more companies are being successfully targeted with ransomware attacks, should they pay up and risk fuelling the crime? Do they have a...

Read More…
unknownx500

0 0 2

Is the UK ready for GDPR compliance legislation?

A new report by Sophos has found that 54% of UK businesses have little to no understanding of the fines they might incur under the new...

Read More…
unknownx500

0 0 8

SMB exposure post-wannaCry

WannaCry has changed our lives, if we have learned something after this ransomware attack is that we have to keep our software...

Read More…
unknownx500

0 0 0

Blockchain

So it already started...keeping the data secure so that in case it is stolen, it is useless to the hackers....

Won't be surprised if IAM...

Read More…
unknownx500

0 0 5

Spam botnets

The number of affected devices is strikingly high, but the worst thing is that most of them or even worse none of them know that they are...

Read More…
unknownx500 Visual Content

0 0 3

Is your Mac as safe as you thought?

Any Mac user will say that one of the attractions is that Mac's are immune from hackers. Was this ever really true and have Mac users...

Read More…
unknownx500

0 0 0

The 15 worst data security breaches

Safeguarding passwords will help. Keeping different passwords for different portals, based on the criticality of the web site (social...

Read More…
unknownx500

0 0 0

Don't believe your own hype

Hubris and confidence about self (individual, product, company) - a very thin line to manage.

We’re all about saying things that sound both plausible and very impressive or things that make us sound really smart and full of...…

Read More…
unknownx500

0 0 0

Social Media and click fraud

Makes one wonder what amount of breached identity data is real and not just noise created by the bots.

A significant portion of internet traffic isn't real. It's perpetuated by bots, fake accounts set up to artificially inflate the...…

Read More…
unknownx500

0 0 5

The cost of cybercrime

That cybercrime has a cost is nothing new, what is remarkable from my point of view is that it is rising every year and what it is even...

Read More…
unknownx500

0 0 0

Android Apps with Malware

Mobile Cybersecurity - that will become bigger then the regular online Cybersecurity, since all of us practical live off our mobile devices.

Read More…
unknownx500

0 0 0

Cybersecurity and Blockchain

What happens to any stolen or breached data - if it is well protected using some encryption?

We need to start thinking about breached data...

Read More…
unknownx500

1 0 0

Autonomous vehicles and Hacking

With the ability to hack the vehicles remotely or locally - this will become another frontier for Cyber Security companies to provide...

Read More…
unknownx500

1 0 0

GDPR and your data

Worth reading if you are in the business of storing customer data.

This blog is going to simplify and demystify GDPR.

unknownx500

0 0 0

Chat Apps as Malware C&C

Given that many Enterprise organization uses these tools for their internal communication - and to share many sensitive piece of...

Read More…
unknownx500

0 0 0

Infosec London 2017

Have a great conference Richard!

I am hoping we will get some traction on 4iQ front with the right vendors at the venue.


It's that time of year when the security world gathers in London to show of the latest solutions for tackling cybercrime. Once again more...…

Read More…
unknownx500

0 0 2

OneLogin password manager exposed

What happens when a trusted password manager has its data breached and how should its users react? Data breaches are now more common than...

Read More…
unknownx500

As a free user, you can follow Passle and like posts.

To repost this post to your own Passle blog, you will need to upgrade your account.

For plans and pricing, please contact our sales team at sales@passle.net

Sorry, you don't have permission to repost or create posts.

Repost successful!

View the repost

Repost successful!

Your repost is currently a draft. Review your repost and request approval.

Something went wrong whilst reposting - please try again.

Sorry - this is not an option. This post already exists in the Passle you have selected.

Try reposting to another Passle.