Security

New Report Shows That Denial-Of-Service Remains The Most Common Cyberattack

For the last 14 years, Verizon has been releasing its report into the most common forms of cyberattacks. The 2021...
Read more about New Report Shows That Denial-Of-Service Remains The Most Common Cyberattack

Preventing IP Theft In 3D Printing

1
While it’s perhaps fair to say that 3D printing has not been quite as transformative as was originally predicted, it...
Read more about Preventing IP Theft In 3D Printing

Ambuj Kumar, Fortanix: if your business is on the internet, it needs data security

Cloud services allow businesses to effectively store and manage customer data and private information across platforms. But the question of...
Read more about Ambuj Kumar, Fortanix: if your business is on the internet, it needs data security

Eric Dowsland, Herjavec Group: when it comes to targeting victims, hackers don’t discriminate

Cyber attacks on giant corporations quickly make the news, creating an illusion that only big enterprises get targeted by cybercriminals....
Read more about Eric Dowsland, Herjavec Group: when it comes to targeting victims, hackers don’t discriminate

Scambaiters: vigilante cybercrime fighters who mean well but do more harm than good

The popularity of scambaiting communities clearly shows there is a public desire for more action against online fraud, but they...
Read more about Scambaiters: vigilante cybercrime fighters who mean well but do more harm than good

Who is most vulnerable to cybercrime: new report reveals surprising insights

Cybercrime has undoubtedly risen during the Covid-19 pandemic, but the risk of attack has not been equally spread across society....
Read more about Who is most vulnerable to cybercrime: new report reveals surprising insights

Surag Patel, Contrast Security: a single point of code insertion can have monumental repercussions

The increasing digitalization of business processes calls not only for a safe but also a next-generation approach to application security....
Read more about Surag Patel, Contrast Security: a single point of code insertion can have monumental repercussions

Dan Stone, Storage Made Easy: people are both the weakest link and the strongest line of defense

Work from home has become the new reality for businesses worldwide, offering a flexible and convenient model of operations. But...
Read more about Dan Stone, Storage Made Easy: people are both the weakest link and the strongest line of defense

Gary Phipps, CyberGRX: cybersecurity is a cat and mouse game

As ransomware picks up its pace, more companies turn to the cybersecurity field to look for effective solutions to combat...
Read more about Gary Phipps, CyberGRX: cybersecurity is a cat and mouse game

Mark Nunnikhoven, Lacework: as the cloud grows, the attack surface becomes seemingly infinite

The increasing popularity of the cloud can be easily explained by its effectiveness and a wide range of benefits -...
Read more about Mark Nunnikhoven, Lacework: as the cloud grows, the attack surface becomes seemingly infinite

We've seen just the tip of the Mēris botnet iceberg

1
Last month, a Russian tech giant Yandex was hit by the largest DDoS attack in history. The record-breaking attack was...
Read more about We've seen just the tip of the Mēris botnet iceberg

Is deepfake satellite imagery the next battleground?

As deepfake technology becomes more potent, experts warn that “deepfake geography” may be an increasingly pressing problem. Globally, the alternative...
Read more about Is deepfake satellite imagery the next battleground?

Aviv Grafi, Votiro: the most targeted industries are soon to be healthcare, insurance, and finance

Cyber-attacks remain on the rise, affecting everyone from individuals to giant corporations. The trend is expected to continue with new...
Read more about Aviv Grafi, Votiro: the most targeted industries are soon to be healthcare, insurance, and finance

Reports highlight the astronomical cost of ID theft

With most of us spending more time online than ever before, cybercriminals have made hay. Ironically, their profits are compounded...
Read more about Reports highlight the astronomical cost of ID theft

How to secure cyber-physical supply chains

The merging of digital and physical domains is a central part of the digital transformation we're going through as part...
Read more about How to secure cyber-physical supply chains

Social media vs cybersecurity: how to safely use social media at work

In the early days of social media, organizations were primarily concerned with employees wasting their time online when they should...
Read more about Social media vs cybersecurity: how to safely use social media at work

Alastair Paterson, Digital Shadows: criminals capitalize on the confusion

The rise of cybercrime has been echoing across the globe, with financial losses estimated at $6 trillion by the end...
Read more about Alastair Paterson, Digital Shadows: criminals capitalize on the confusion

Popular Android apps with 142.5 million collective installs leak user data

1
14 top Android apps with 142.5 million installs are misconfigured, leaving their data exposed to unauthorized parties. Nine out of...
Read more about Popular Android apps with 142.5 million collective installs leak user data

Using cyberattacks to make AI more energy hungry

Training of AI-based systems is already incredibly inefficient, and new research suggests that hackers may be about to make things...
Read more about Using cyberattacks to make AI more energy hungry

Glacier Kwong from Hong Kong: speaking up when you’re being monitored takes a lot of creativity

Hong Kong is nothing more than a Chinese city now, says Glacier Kwong from Keyboard Frontline. She welcomes Google’s decision...
Read more about Glacier Kwong from Hong Kong: speaking up when you’re being monitored takes a lot of creativity