Security
New Report Shows That Denial-Of-Service Remains The Most Common Cyberattack
For the last 14 years, Verizon has been releasing its report into the most common forms of cyberattacks. The 2021...
Read more about New Report Shows That Denial-Of-Service Remains The Most Common Cyberattack
Preventing IP Theft In 3D Printing
While it’s perhaps fair to say that 3D printing has not been quite as transformative as was originally predicted, it...
Read more about Preventing IP Theft In 3D Printing
Ambuj Kumar, Fortanix: if your business is on the internet, it needs data security
Cloud services allow businesses to effectively store and manage customer data and private information across platforms. But the question of...
Read more about Ambuj Kumar, Fortanix: if your business is on the internet, it needs data security
Eric Dowsland, Herjavec Group: when it comes to targeting victims, hackers don’t discriminate
Cyber attacks on giant corporations quickly make the news, creating an illusion that only big enterprises get targeted by cybercriminals....
Read more about Eric Dowsland, Herjavec Group: when it comes to targeting victims, hackers don’t discriminate
Scambaiters: vigilante cybercrime fighters who mean well but do more harm than good
The popularity of scambaiting communities clearly shows there is a public desire for more action against online fraud, but they...
Read more about Scambaiters: vigilante cybercrime fighters who mean well but do more harm than good
Who is most vulnerable to cybercrime: new report reveals surprising insights
Cybercrime has undoubtedly risen during the Covid-19 pandemic, but the risk of attack has not been equally spread across society....
Read more about Who is most vulnerable to cybercrime: new report reveals surprising insights
Surag Patel, Contrast Security: a single point of code insertion can have monumental repercussions
The increasing digitalization of business processes calls not only for a safe but also a next-generation approach to application security....
Read more about Surag Patel, Contrast Security: a single point of code insertion can have monumental repercussions
Dan Stone, Storage Made Easy: people are both the weakest link and the strongest line of defense
Work from home has become the new reality for businesses worldwide, offering a flexible and convenient model of operations. But...
Read more about Dan Stone, Storage Made Easy: people are both the weakest link and the strongest line of defense
Gary Phipps, CyberGRX: cybersecurity is a cat and mouse game
As ransomware picks up its pace, more companies turn to the cybersecurity field to look for effective solutions to combat...
Read more about Gary Phipps, CyberGRX: cybersecurity is a cat and mouse game
Mark Nunnikhoven, Lacework: as the cloud grows, the attack surface becomes seemingly infinite
The increasing popularity of the cloud can be easily explained by its effectiveness and a wide range of benefits -...
Read more about Mark Nunnikhoven, Lacework: as the cloud grows, the attack surface becomes seemingly infinite
We've seen just the tip of the Mēris botnet iceberg
Last month, a Russian tech giant Yandex was hit by the largest DDoS attack in history. The record-breaking attack was...
Read more about We've seen just the tip of the Mēris botnet iceberg
Is deepfake satellite imagery the next battleground?
As deepfake technology becomes more potent, experts warn that “deepfake geography” may be an increasingly pressing problem. Globally, the alternative...
Read more about Is deepfake satellite imagery the next battleground?
Aviv Grafi, Votiro: the most targeted industries are soon to be healthcare, insurance, and finance
Cyber-attacks remain on the rise, affecting everyone from individuals to giant corporations. The trend is expected to continue with new...
Read more about Aviv Grafi, Votiro: the most targeted industries are soon to be healthcare, insurance, and finance
Reports highlight the astronomical cost of ID theft
With most of us spending more time online than ever before, cybercriminals have made hay. Ironically, their profits are compounded...
Read more about Reports highlight the astronomical cost of ID theft
How to secure cyber-physical supply chains
The merging of digital and physical domains is a central part of the digital transformation we're going through as part...
Read more about How to secure cyber-physical supply chains
Social media vs cybersecurity: how to safely use social media at work
In the early days of social media, organizations were primarily concerned with employees wasting their time online when they should...
Read more about Social media vs cybersecurity: how to safely use social media at work
Alastair Paterson, Digital Shadows: criminals capitalize on the confusion
The rise of cybercrime has been echoing across the globe, with financial losses estimated at $6 trillion by the end...
Read more about Alastair Paterson, Digital Shadows: criminals capitalize on the confusion
Popular Android apps with 142.5 million collective installs leak user data
14 top Android apps with 142.5 million installs are misconfigured, leaving their data exposed to unauthorized parties. Nine out of...
Read more about Popular Android apps with 142.5 million collective installs leak user data
Using cyberattacks to make AI more energy hungry
Training of AI-based systems is already incredibly inefficient, and new research suggests that hackers may be about to make things...
Read more about Using cyberattacks to make AI more energy hungry
Glacier Kwong from Hong Kong: speaking up when you’re being monitored takes a lot of creativity
Hong Kong is nothing more than a Chinese city now, says Glacier Kwong from Keyboard Frontline. She welcomes Google’s decision...
Read more about Glacier Kwong from Hong Kong: speaking up when you’re being monitored takes a lot of creativity