Category: News
I’ve written previously on the emergence of security as a competitive differentiator, and how that trend is helping both consumers, businesses, and society at large. I’ve written previously on the emergence of security as a competitive differentiator, and how that trend …
After landing at Nigeria’s Murtala Muhammed International Airport Lagos and successfully navigating your way past border control and luggage collection, you have the chance to purchase a subscriber identification module (SIM) card in the arrival hall on the landside. Welcome! …
The reality is that there is no master list of cyber risks. When it comes to cyber threats, there is no one size fits all. The cyber security risks are mostly dependent on the organisations themselves – what products and …
The chief information security officer of Just Eat has challenged the perception that all cyber attacks are sophisticated and that it is impossible to fill cyber security jobs. Many of the cyber attacks that organisations are facing exploit failings in …
A security breach at family networking and genealogy website MyHeritage leaked the data of over 92 million users, the company said in a blog posted on Monday. The breach took place on Oct. 26 last year, and consisted of the …
Facebook reportedly has not answered hundreds of written questions submitted from members of Congress. The U.S. Senate Commerce Committee demanded that Facebook‘s chief executive officer respond to a report that user data was shared with at least 60 device manufacturers, weeks …
On Monday, MyHeritage, an online genealogy platform, announced that more than 90 million of their users had email addresses and hashed passwords compromised, after a researcher discovered a file being hosted on a private server. MyHeritage confirmed that the contents of …
Other trouble for Facebook, according to the article of The New York Times: the social media would have signed agreements allowing phone and other device makers to access vast amounts of users’ personal information, without their explicit consent. Whether it …
Why is it important to know where data flows, with whom it’s shared and where it lives at rest, and what is the best way of achieving this? Data flow monitoring has existed for many years. My first experience was …
Any organization that handles the data of individuals in Europe, including any U.S-based company that does business there, must now comply with the General Data Protection Regulation (GDPR). Specifically, GDPR dictates that individuals have the right to be told what personal data of theirs …
Moving to the cloud presents both opportunities and challenges. Here are three things you can do to make sure the benefits outweigh the risks—and three ways the right identity and access management solution can help. Thanks to the cloud, you’re …
Elderly hacker with little computing experience was able to hack WiFi and create phishing attack An 86-year-old ethical hacker managed to create and distribute a fake phishing scam and hack a Wi-Fi hotspot in less than 17 minutes using online guides. Spanish …
Security suppliers should avoid making unsubstantiated bold claims about their products, especially if they have not had them reviewed by the community, according to security researcher Scott Helme. “While some of the larger security suppliers are interacting with the security research …
Modern technology is constantly making our lives easier. Our phones and the applications we use make it more convenient to work, play and listen. If you need door-to-door ground transportation, you can access a ridesharing app to immediately call for …
White House identifies federal agency cybersecurity risks — Senate defense policy bill boosts U.S. Cyber Command. S ANYBODY LISTENING? — Congressional Democrats haven’t been shy about seeking answers from the Trump administration on its cybersecurity policies. But some of the more frequent …
Although not as well known as ransomware attacks, VPN hacks are often part of highly targeted cyber attacks, according to Ofer Shezaf, director of cyber security at Varonis Systems. “We seldom learn the technical means used in such attacks, but the attack on …
International justice summit to discuss cybersecurity — What seized cybercriminal email accounts reveal. THE MORE THINGS CHANGE… — Congress today hosts an eventcommemorating the 20-year anniversary of the first ever cybersecurity hearing, where the witnesses from that day — members of the hacking …
Top cyber Senate Republican seeks insight on White House moves — L0pht members find good, bad since 20-year anniversary. IN REVERSE? — Eleven federal agencies actually got lower grades in the latest scorecard that measures their performance under a 2014 IT overhaul law, the …
A Canadian accused of helping Russian intelligence agents break into email accounts as part of a massive 2014 data breach at Yahoo was sentenced to five years in prison on Tuesday and ordered to pay a $250,000 fine. Karim …
The FBI warned Russian computer hackers had compromised hundreds of thousands of home and office routers and could collect user information or shut down network traffic. FBI warns Russians hacked hundreds of thousands of routers in over 50 countries 23 Hours …