Please turn on your JavaScript for this page to function normally.
Bitcoin
Bitcoin cyber attacks surge following rising demand and increasing price of bitcoin

Phishing impersonations and business email compromise (BEC) attacks designed to steal victims’ bitcoin surged by 192% between October 2020 and May 2021, closely following the …

Organizations increasingly reluctant to pay ransomware demands

To better understand concerns about recent ransomware attacks, Menlo Security conducted a global poll on responses and reactions to ransomware. attacks. Organizations hit by …

SAP
Why are companies in the SAP S/4HANA transformation holding back?

For SAP’s estimated 35,000 ERP customers worldwide, it’s not a question of whether they will migrate to S/4HANA – but when and how. A recent study by LeanIX …

wireless
Worldwide wireless 5G connections reach 298 million in Q1 2021

The state of the race for the fifth generation of wireless (5G) subscriber adoption has tightened up significantly, as global wireless 5G connections for Q1 2021 reached 298 …

week in review
Week in review: PoC for Windows Print Spooler flaw leaked, conquering synthetic identity fraud

Here’s an overview of some of last week’s most interesting news and articles: PoC for critical Windows Print Spooler flaw leaked Microsoft has confirmed that the …

vulnerability
Single page web applications and how to keep them secure

Application developers such as Airbnb, Pinterest and LinkedIn showcase a new approach to designing and building modern web applications. Using what is known as a single page …

user
How facial recognition solutions can safeguard the hybrid workplace

The number of US adults teleworking due to the pandemic fell by 30% between January and May 2021 (from 23% to 16%), with the biggest drop in May. As more employees return to …

5G
How mobile operators view security in the 5G era

There’s a major gap in security capability among mobile operators, which in many cases is not yet being filled by industry partnerships, Trend Micro reveals. In the 5G …

Business ideas
Most enterprises started a modernization program due to the pandemic

Advanced released a report which examines the current mainframe market, the associated challenges facing large enterprises worldwide, and the impact COVID-19 has and will …

Decision makers divided about cloud technology adoption

As businesses seek technology solutions that help us prepare for a new post-pandemic normal, cloud adoption rates continue to rise. In fact, according to research, 67% of all …

idea
Resilience by design: What security pros need to know about microlearning

It’s no secret that security training is failing us. Research has revealed that more 90% of people struggle to identify a phishing email — arguably one of the most basic …

email
Protecting your organizations against BEC and other email attacks

No matter who you talk to or work with, they probably use email as a primary means of communication. Most of us spend about 5 hours a day checking email, sometimes refreshing …

Don't miss

Cybersecurity news