Please turn on your JavaScript for this page to function normally.
money
The war against the virus also fueling a war against digital fraud

TransUnion’s latest analysis of global online fraud trends found that since the COVID-19 pandemic began, fraudsters are increasing their rate of digital schemes against …

attacks
Attack volume surged by 48% during the first year of the pandemic

A Mimecast report details how threat actors targeted remote workers during the first year of the pandemic, March 2020 – February 2021. The report describes how attack volume …

Financial services and insurance faring better than most in the pandemic year

While 2020 was one of the most challenging years for every business, those in financial services and insurance have fared better than most. This is the conclusion of a deeper …

crypto currency
With more than 400,000 crypto scams created in 2020, increase of 75% predicted for 2021

The findings of a Bolster report, along with real life examples, clearly correlate the rise in crypto scams to the value and popularity of cryptocurrencies as well as the …

Tor Project
How to get affordable DV certificates for onion sites

The Tor Project, the nonprofit developers of the Tor network and Tor Browser, have announced two exciting developments for onion services: affordable DV certificates for v3 …

fleeceware apps
Fleeceware apps extract hundreds of dollars per year from their users through subscription services

Avast has discovered more than 200 new fleeceware applications on the Apple App Store and the Google PlayStore. The apps have been downloaded approximately one billion times …

Bug
Microsoft offers rewards for security bugs in Microsoft Teams

Microsoft is starting a new Applications Bounty Program, and the first application that they want researchers to find bugs in is Microsoft Teams, its popular business …

find
Challenges and benefits of using threat data feeds

Threat data feeds can help organizations strengthen their cybersecurity posture, according to a report from the Ponemon Institute. As cyberthreats proliferate, many …

network
Using memory encryption in web applications to help reduce the risk of Spectre attacks

There’s nothing quite like an actual proof-of-concept to make everyone listen. I was pleased by the PoC released by Google security engineers Stephen Röttger and Artur Janc …

hands
Distributed and remote work creating a perfect storm for network security teams

Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a FireMon research has found. The survey of 500 cybersecurity …

network
Continued WAN and application growth resulting in network complexity

The WAN continues to extend its growth, with the number of enterprises connecting to over 100 inter-regional sites growing by 50%, from 19% in 2020 to 28% in 2021, according …

brain
61% of businesses say competitive intelligence has made a direct impact on revenue

61% of businesses say competitive intelligence has made a direct impact on revenue — a 17% increase over last year’s figure of 52%, a Crayon report reveals. Competitive …

Don't miss

Cybersecurity news