© 2022 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.

Security

Exposed: the threat actors who are poisoning Facebook

An investigation of the infamous “Is That You?” video scam has led Cybernews researchers to a cybercriminal stronghold, from which threat actors have been infecting the social media giant with thousands of malicious links every day. At least five suspects, thought to be residing in the Dominican Republic, have been identified.
Read more about Exposed: the threat actors who are poisoning Facebook

Christopher Turco, StackPath: “companies often overestimate their employees’ security consciousness”

Many employees might not be aware of how hackers deploy phishing to obtain access to sensitive workplace data or one’s...
Read more about Christopher Turco, StackPath: “companies often overestimate their employees’ security consciousness”

Farry Argoebie, Terralogiq: "80% of all data has a location component, but only 10% is being used by businesses"

Business data is one of the most valuable assets in today’s cyber landscape. That includes private client files, internal company...
Read more about Farry Argoebie, Terralogiq: "80% of all data has a location component, but only 10% is being used by businesses"

Alex Ivanov, StorPool Storage: “companies prefer to focus on their business while someone else takes care of their IT”

According to StorPool specialists, around 90% of the security measures used by companies today should relate to the education of...
Read more about Alex Ivanov, StorPool Storage: “companies prefer to focus on their business while someone else takes care of their IT”

Sam Crowther, Kasada: “solutions need to destroy the financial incentive for an operator to attack”

We’re all familiar with the process of choosing which of the pixelated pictures depict a seaplane and proving you’re human....
Read more about Sam Crowther, Kasada: “solutions need to destroy the financial incentive for an operator to attack”

Mathieu Gorge, VigiTrust: “the more information you share – the bigger your risk surface is”

The rapid global digital transformation introduced not only new technologies but also a new approach to working. This new connectivity...
Read more about Mathieu Gorge, VigiTrust: “the more information you share – the bigger your risk surface is”

Ali El Kaafarani, PQShield: “early iterations of the quantum threat could be state-sponsored attacks”

Much like everything in the world, the current encryption methods aren’t not going to suffice forever. Most likely sooner than...
Read more about Ali El Kaafarani, PQShield: “early iterations of the quantum threat could be state-sponsored attacks”

Michael Waksman, Jetico: “you open yourself to serious risks when sharing files without encrypting them first”

Everyone should understand and be aware of how their data and online activities can be tracked and transmitted – and...
Read more about Michael Waksman, Jetico: “you open yourself to serious risks when sharing files without encrypting them first”

Dieter Spangenberg, Koin: “new businesses are the most attractive target for fraudsters”

Over the last few years, there has been a massive increase in online shopping. Unfortunately, new eCommerce stores and unsuspecting...
Read more about Dieter Spangenberg, Koin: “new businesses are the most attractive target for fraudsters”

Ian Cornielje, Tergos: “the importance of cybersecurity is still terribly underestimated by organizations”

Because of the current global events, the demand for cybersecurity upgrades has been rapidly increasing in the business sector. It’s...
Read more about Ian Cornielje, Tergos: “the importance of cybersecurity is still terribly underestimated by organizations”

Jags Kandasamy, Latent AI: “most enterprises simply lack the expertise to successfully implement AI”

While Artificial Intelligence and Machine Learning have been around for some time now, enterprises still struggle to harness the power...
Read more about Jags Kandasamy, Latent AI: “most enterprises simply lack the expertise to successfully implement AI”

Open dataset leaves job seekers from Eastern Europe at risk

International job search engine Jooble.org put itself and its clients in peril by leaving a 470GB database unprotected.
Read more about Open dataset leaves job seekers from Eastern Europe at risk

Sashank Purighalla, BOS Framework: “modernization is the only way to ensure an organization's architectural security”

According to our guest today, the security ecosystem must be built on solid foundations, with a watertight architecture. If security...
Read more about Sashank Purighalla, BOS Framework: “modernization is the only way to ensure an organization's architectural security”

Juan Salvador Ubeira Ruiz, Fraud.com: "fraudsters are very creative and are constantly adapting"

Fraud is floating around consumer contact points and the fraudsters’ schemes keep evolving. Organizations need to adapt and embrace the...
Read more about Juan Salvador Ubeira Ruiz, Fraud.com: "fraudsters are very creative and are constantly adapting"

Oleg Sotnikov, AppMaster: “there is a lot of outdated software around the world that cannot be updated easily”

It’s not only just the first stages of the software development process that require a great deal of effort and...
Read more about Oleg Sotnikov, AppMaster: “there is a lot of outdated software around the world that cannot be updated easily”

Mandar Shinde, Blotout: “customer data needs to be secured and solely managed by the sites or apps they visit”

The marketing sector is currently facing difficult challenges, such as society’s increased privacy awareness, growth in advertising costs, and more....
Read more about Mandar Shinde, Blotout: “customer data needs to be secured and solely managed by the sites or apps they visit”

Does your small business need cyber insurance?

With attacks on the rise, organizations need to evaluate their risk and decide whether they need cyber insurance. Here are...
Read more about Does your small business need cyber insurance?

Justine Siebke, Skurio: “on average it takes 297 days for a business to identify a breach when it occurs”

In the field of cyber security, the size of a company doesn’t determine whether you’re going to be attacked or...
Read more about Justine Siebke, Skurio: “on average it takes 297 days for a business to identify a breach when it occurs”