Security

Cancel culture and politics aside, one of the more brutal threats lurking in the shadows of the internet is the slander industry. All too often, unsuspecting people become victims of websites that promote slanderous, often unverified information about individuals. This false and vilifying informatio...

Clients of SolarWinds, which experienced a high-profile data breach last year, are being targeted in a probe by the U.S. Securities and Exchange Commission, according to a Reuters report. "The impact of these large-scale breaches clearly has the potential to destabilize stock prices and the broader ...

Reports of a data breach of TurboTax have been overblown, according to Intuit which owns the tax preparation platform. Several news outlets recently reported that an unspecified number of TurboTax accounts were compromised in a wave of credential stuffing attacks. Those kinds of attacks exploit cred...

Apple on Monday revealed dozens of new features in the latest versions of its mobile and desktop operating systems at the kickoff of its annual Worldwide Developers Conference. "The emphasis of the whole presentation seemed to be making Apple products more useful for consumers," observed Gartner S...

Open source software is now the foundation for the vast majority of applications across all industries, however many of those industries are struggling to manage open source risk. Organizations, regardless of industry, must do a better job maintaining open source components given their critical natu...

That old adage about crime never pays could not be more false, at least when it comes to modern-day cybercriminals. For those bad actors using ransomware as their weapon, crime is paying more than ever. A new report by the eSentire security research team found that six ransomware gangs claimed at le...

IT experts at the hacked Colonial Pipeline did a good job in mitigating the May 7 cyberattack and successfully stopped it when discovered by shutting down the network. But the attack was mostly invisible in the weeks-long initial stages, according to a briefing NTT Security executives conducted Tues...

New research by threat detection and response firm Vectra AI shows that the most common threats to corporate networks remain consistent throughout all companies -- regardless of their size. Researchers calculated the relative frequency of threat detections that were triggered during a three-month sp...

Cybercriminals are deliberately targeting phones, tablets, and Chromebooks to increase their odds of finding a vulnerable entry point. The Financial Services Threat Report from Lookout disclosed that 20 percent of mobile banking customers had a trojanized app on their devices when trying to sign int...

Advancements in 5G connectivity and accelerated digital transformation of business operations creates heightened risk and expanded attack surfaces for security teams to harden and protect. Now, efforts by several internet industry groups are focused on new measures to fix inherent security weaknesse...

HOW TO

Bolt-On Security the Linux Way

In this piece, I aim to provide a range of simple but effective options for encrypting a small number of files. In particular, these options are salient for use cases like tax filing, where users are sending sensitive documents to recipients with an unknown degree of technical proficiency. Fond as I...

The 2021 edition of Proofpoint's Voice of the CISO report -- based on a survey of more than 1,400 CISOs in 14 countries -- found 66 percent of the executives acknowledged their organizations were unprepared to handle a targeted cyberattack this year. In addition, more than half the CISOs admitted th...

More than 90 percent of U.S. users of the latest version of Apple's mobile operating system iOS 14.5 are taking advantage of a new feature to block an application's ability to track their activity on their phones. Worldwide, 88 percent of users shut down app tracking on their iPhones. This is bad ne...

A recent study by Kaspersky revealed that nearly one quarter of PCs still run Microsoft Windows 7, which stopped receiving mainstream support in January 2020. Using an end-of-life operating system that no longer receives security updates is akin to driving a car with a brake light on, suggested Oli...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

Technewsworld Channels