Today’s threat landscape is constantly evolving. In 2016 in particular, we’ve seen a huge shift with adversaries penetrating organisations from the DNC to WADA and gaining access to sensitive documents that were later leaked to embarrass individuals. Yet, while many
Investigation finds that network was not kept disconnected from the internet, resulting in leaks of confidential information
The first exclusive military computer network in the history of South Korea’s military was exposed to malicious code for at least 46 days
North Korea’s government sanctioned Red Star operating system (OS) contains a vulnerability that can allow attackers to hack into it remotely, according to security experts. The reclusive nation’s secretive Linux-based OS was leaked to the world in 2015 and ever
The number of active malware families and number of attacks increased by 5% in October, according to the Global Threat Index, a monthly ranking from Check Point Software Technologies.
The company’s threat intelligence research team found that locky ransomware attacks
IRONSCALES, the first and only automated email phishing response solution to combine human intelligence with machine learning, today announced the release of its newest whitepaper, “Combatting Modern Email Phishing Attacks: The Power of Incorporating Machine Learning into a Phishing Mitigation
Hotel and restaurant chains, beware. A notorious cybercriminal gang is tricking businesses into installing malware by calling their customer services representatives and convincing them to open malicious email attachments.
The culprits in these hacks, which are designed to steal customers’
The internet is increasingly a target for those who want to silence speech. An Oct. 21 cyberattack rendered social media sites like Twitter and Reddit and news sites like Fox News and CNN inaccessible to millions of users. Another attack
As workplaces around the globe become increasingly internet-reliant, business owners have reasons to be concerned. Modern employees frequently access work-related material on personal devices. Cloud storage and virtualization require a persistent internet connection to be of any use. While these
They say that the house always wins. But have hackers turned the tables on the dealers?
CBC reports that, “Private SIN and debt info, credit card data of customers, staff, suppliers [were] accessed” in what is the second major breach
ANDERSON – On the advice of their insurance company Madison County officials are moving forward to pay the ransom demands by a unknown group that attacked the county’s computer system.
Madison County was hit by a ransomware attack over the
A new strain of android malware has been found targeting banking and social media apps. Reports suggest around 94 different banking apps are currently being targeted including Santander, American Express, and Paypal. The malware overlays the screen for these other
A computer virus has paralyzed three hospitals in the UK forcing them to cancel hundreds of scheduled surgeries, as it targeted computers of the National Health Service (NHS). Healthcare facilities located near Lincolnshire, in the east, were the most affected.
When it comes to cybersecurity, healthcare organizations are most concerned about social engineering, data theft and internal threats. And they perceive ransomware and malware as the top ways that cyber criminals are exploiting their weaknesses.
Those are among the findings
In 2015, the U.S. Director of National Intelligence ranked cybercrime as the No. 1 security threat in the country. Despite popular belief, cyber criminals actually prefer small businesses simply because they are easier to infiltrate.
As technology advances, cybercrime tactics
International Business Machines Corp (IBM) apologised to Australia on Tuesday (Oct 25) for what the government has described as a “malicious” cyber-attack that shut down a national census, but blamed two domestic Internet providers for the security lapse.
Attackers can send malicious code to industrial engineering software to take over workstations used to program and control PLCs
The software used to program and deploy code to various Schneider Electric industrial controllers has a weakness that could allow hackers
With hackers now gaining access to cell phones, security cameras even toasters and coffee pots, it’s more important than ever to learn about the latest ways to protect personal and business technologies.
The 12th annual Cyber Security and Awareness Fair
Why Password Managers are the Starting Blocks of Cyber-Security
As a business owner or office manager, you already know that cyber-security is a race — against hackers, against malware, against the dark web. You need to come out of the
Privacy advocates in Congress are moving to stop a new rule from taking effect Dec. 1 that would allow federal agents armed with a single search warrant to hack millions of Americans’ computers at once.
“It’s more government surveillance,” said
Security firm Kaspersky Lab revealed on Monday a new malware called StrongPity. It targets web surfers who are looking for two specific tools: WinRAR and TrueCrypt. The former is a popular file compression program, and the latter was once an