Please turn on your JavaScript for this page to function normally.
BGU Zoom research
Researchers extract personal data from video conference screenshots

Video conference users should not post screen images of Zoom and other video conference sessions on social media, according to Ben-Gurion University of the Negev researchers, …

BYOD
BYOD adoption is growing rapidly, but security is lagging

As the shift to remote work has increased, most businesses are embracing BYOD in the workplace. In a survey by Bitglass, 69% of respondents said that employees at their …

architecture
Data exfiltration: The art of distancing

We have all seen the carefully prepared statement. A cyber incident has occurred, we are investigating but please do not worry since no data has left our network. Perhaps we …

identity
New technique keeps your online photos safe from facial recognition algorithms

In one second, the human eye can only scan through a few photographs. Computers, on the other hand, are capable of performing billions of calculations in the same amount of …

A Boxcryptor audit shows no critical weaknesses in the software

More and more companies, self-employed and private customers are using Boxcryptor to protect sensitive data – primarily in the cloud. Boxcryptor ensures that nobody but …

identity theft
New privacy-preserving SSO algorithm hides user info from third parties

Over the last few decades, as the information era has matured, it has shaped the world of cryptography and made it a varied landscape. Amongst the myriad of encoding methods …

encryption
Data security matters more than ever in the new normal

Even before lockdowns, there was a steady migration toward more flexible workforce arrangements. Given the new normal of so many more people working from home—on top of a pile …

laptop
Remote employees encounter 59 risky URLs per week

Working remotely from home has become a reality for millions of people around the world, putting pressure on IT and security teams to ensure that remote employees not only …

search
Marred by garbage: Striking a balance for security data

Security applications are subject to the age-old computing axiom of “garbage in, garbage out.” To work effectively, they need the right data. Too much irrelevant data may …

key
Core cybersecurity principles for new companies and products

The rapid increase in cyberattacks and pressures escalating from changes prompted by COVID-19 have shifted consumer behavior. The findings of a report by the World Economic …

person
Consumer security concerns at an all-time high, but priorities have shifted

31% of Americans are concerned about their data security while working from home during the global health crisis, according to a Unisys Security survey. Consumer security …

healthcare
Privacy and security concerns related to patient data in the cloud

The Cloud Security Alliance has released a report examining privacy and security of patient data in the cloud. In the wake of COVID-19, health delivery organizations (HDOs) …

Don't miss

Cybersecurity news