
Trusted identities bridge gap between connected workers and smart buildings
Trusted identities can serve as the backbone for smart buildings and today’s connected workforce, according to a new study conducted by IFSEC Global. The study focused on how …

Forget about the malware, go after attackers’ tactics, techniques and procedures
The cybercriminal’s options for monetizing attacks has never been broader, less complex, or less risky, and attempts to detect intrusions by detecting the malware they …

When it comes to cybersecurity, businesses remain overconfident and vulnerable
Consumer products companies, retailers and restaurant businesses may be operating with a false sense of security, according to a new Deloitte study. The study captures input …

Email scammers swindle US State Supreme Court judge out of $1 milion
If often happens to less prominent individuals, but this time it happened to a US State Supreme Court judge: scammers have managed trick her into wiring the money meant for …

Largest US voter data leak shines light on many problems
If US citizens weren’t convinced by now that they have long lost control of their data, the fact is more than obvious after a misconfigured database containing 198 …

Mozilla ports simplified private browsing app to Android
Less than a year since the release of Firefox Focus for iOS, Mozilla has ported the privacy-focused browser to Android. What is Firefox Focus? Firefox Focus is a simplified …

Average data breach cost declines 10% globally
The average cost of a data breach is $3.62 million globally, a 10 percent decline from 2016 results. This is the first time since the global study was created that there has …

When it comes to trustworthy websites, banks drop the ball
OTA’s ninth annual Online Trust Audit & Honor Roll analyzed more than 1,000 consumer-facing websites for their website and email security and privacy practices. The Audit …

AI can increase corporate profitability by average of 38% by 2035
Businesses that successfully apply artificial intelligence (AI) could increase profitability by an average of 38 percent by 2035, according to Accenture. The introduction of …

Cybersecurity trends: Fight against cybercrime shows both improvements and downsides
Trustwave released the 2017 Trustwave Global Security Report which reveals the top cybercrime, data breach and security threat trends from 2016. The report demonstrates both …

Stack Clash bug could give root privileges to attackers on Unix, Linux systems
Qualys researchers have unearthed a serious privilege escalation bug affecting a wide variety of Unix and Unix-based operating systems, and has been working with vendors to …

Hackers extorted a cool $1 million from South Korean web hosting provider
Whether through ransomware, or simply by breaking into computer systems and exfiltrating and deleting the data found on them with other means, cyber extortionists are going …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance