Ready, set, race to the IoT hub
Battle lines are being drawn. Armies are being marshaled. Territory is being eyed and strategies drawn up with military precision. But this war is about to be fought in your …
WannaCry: Who’s behind it? Who’s to blame?
As the amount of money in the three bitcoin addresses associated with the WannaCry attack slowly continues to rise, the question of who is behind the ransomware is still …
DocuSign breached, stolen info used for targeted phishing campaign
Phishing emails impersonating electronic signature technology provider DocuSign are not an unusual sight, but the latest campaign has the added advantage of specifically …
Apple issues security updates for macOS, iDevices
It’s time to patch your Mac, iDevices and software again: Apple has released security updates for MacOS (all the way back to Yosemite), iOS, watchOS, tvOS, iTunes, …
After a data breach is disclosed, stock prices fall an average of 5%
Data security breaches can negatively impact an entire organization – including sales, marketing and IT – and have a significant negative impact on company …
Are you making it easier for identity thieves?
News of data breaches and the risks of identity theft and fraud persist, but consumers’ vigilance and awareness haven’t kept pace. A national survey by Experian …
Stealing Windows credentials using Google Chrome
Attacks that leak authentication credentials using the SMB file sharing protocol on Windows OS are an ever-present issue, exploited in various ways but usually limited to …
United Airlines cockpit access codes leaked online
A United Airlines flight attendant has inadvertently leaked access codes for the company’s airplanes’ cockpit doors, a safety alert email to United employees has …
Major international crackdown on tech support scams
The FTC, along with federal, state and international law enforcement partners, announced Operation Tech Trap, a nationwide and international crackdown on tech support scams …
A guide on how to prevent ransomware
Ransomware is fast becoming a major threat to computer systems in many organisations. It is an aggressive form of attack which criminals use to infect computers and block the …
Microsoft to governments: Stop hoarding vulnerabilities
Microsoft is full of surprises lately: first they issued patches for unsupported versions of Windows, then they publicly criticized the NSA for hoarding knowledge about …
Key to smart cybersecurity spending: Remove redundancies and strive for unification
Over the past two decades, the cybersecurity industry has been completely transformed. For organizations, cybersecurity’s evolution from a cottage industry to an economic …