Please turn on your JavaScript for this page to function normally.
keys
Privileged credential abuse is involved in 74% of data breaches

Most IT decision makers are not prioritizing Privileged Access Management (PAM) practices and solutions, despite knowing privileged credential abuse is involved in almost …

IoT security
Researchers and businesses need to work together to expose IoT vulnerabilities

As the Internet of Things (IoT) grows and smart devices gain popularity, cybercriminals will continue to find new ways to exploit all connected things. Two new vulnerabilities …

Webauthn
How WebAuthn aims to solve the password problem

One of the most pervasive challenges in cybersecurity is the balancing act between protection and usability. Security measures have to prevent malicious actors from accessing …

money
Social media-enabled cybercrime is generating $3.25 billion a year

Social media-enabled cybercrime is generating at least $3.25B in global revenue annually, according to an extensive six-month academic study undertaken by Dr. Mike McGuire, …

DNA
Researchers eavesdrop on DNA synthesizer to steal genetic blueprint

Researchers from the University of California, Irvine (UCI) and the University of California, Riverside (UCR) have uncovered the possibility of an acoustic side-channel attack …

glasses
Consumer attitudes towards security breaches are changing significantly

Transatlantic businesses face greater short-term pain in the US but less long term retribution in the UK following a security breach, according to new data from payment …

Thunderbolt
Many computers are vulnerable to hacking through common plug-in devices

Attackers can compromise an unattended machine in a matter of seconds through devices such as chargers and docking stations. Vulnerabilities were found in computers with …

IoT
Most IoT devices are being compromised by exploiting rudimentary vulnerabilities

Cybercriminals are looking for ways to use trusted devices to gain control of Internet of Things (IoT) devices via password cracking and exploiting other vulnerabilities, such …

healthcare
Healthcare industry: Key trends and cybersecurity challenges

Each year, Bitglass analyzes data from the U.S. Department of Health and Human Services’ “Wall of Shame,” a database containing information about breaches of protected health …

puzzle
How to combat delivery ramifications after a data breach

Following Marriott’s data breach, FTC regulations required the hotel chain to reach out to its entire email list of customers, informing them of a potential leak of their …

Android
Businesses believe they should be patching their Android devices more frequently

The use of Android tablets and handhelds are on the rise in business but security remains a concern. On average, 72% of tablets and handheld devices in businesses (excluding …

password
Blocking compromised passwords from the Collection leaks

It all started with Collection #1, a monster breach dubbed as the biggest data dump in history with its 773 million unique email addresses, and 22 million unique passwords. …

Don't miss

Cybersecurity news