Security
Netflix is a phishing goldmine for cybercriminals
We all love Netflix – which leaves us open to being tricked. The amount of time we’ve spent scrolling through...
Read more about Netflix is a phishing goldmine for cybercriminals
What men can do to help women enter the cybersecurity field
The skills shortage across the cybersecurity sector has been well documented, but with the computing sector generally, and cybersecurity specifically...
Read more about What men can do to help women enter the cybersecurity field
Chinese apps: alternatives to TikTok, WeChat and other popular apps
It's a well-known fact that China is guilty of spying over its citizens. However, its reach doesn't stop there. The...
Read more about Chinese apps: alternatives to TikTok, WeChat and other popular apps
350 million decrypted email addresses left exposed on an unsecured server
The CyberNews research team uncovered an unsecured data bucket owned by an unidentified party, containing seven gigabytes worth of unencrypted...
Read more about 350 million decrypted email addresses left exposed on an unsecured server
Beware using postal and parcel apps
As we’re ordering more online, the attack vectors for hackers become more obviousCybercriminals know how to capitalize on changes in...
Read more about Beware using postal and parcel apps
270 million malware attacks occurred between January and March
While many parts of the economy are slowing down, hacking isn’t We’ve seen an unprecedented change in the world economy...
Read more about 270 million malware attacks occurred between January and March
Cyberwarfare: which countries are targeted the most?
Bad news if you live in the United States: according to the Centre for Strategic and International Studies (CSIS), who...
Read more about Cyberwarfare: which countries are targeted the most?
Malvertising: what you need to know to prevent it
Ads can be annoying, and they can also be dangerous to your cybersecurity. Simply by visiting your favorite daily news...
Read more about Malvertising: what you need to know to prevent it
These are the top 5 malware strains to worry about in 2021
Make sure you avoid these at your perilCybercriminals are always looking for ways to attack their victims, and are constantly...
Read more about These are the top 5 malware strains to worry about in 2021
The cybersecurity challenges for the auto industry
Automobiles are becoming increasingly digital affairs, with developments across shared mobility, electrification, autonomous systems and connectivity all moving the sector...
Read more about The cybersecurity challenges for the auto industry
Is passwordless authentication secure?
A traditional password has long been a central component of cybersecurity. However, according to many data breaches, the most popular...
Read more about Is passwordless authentication secure?
Ransomware insurance: the costs of a clean-up
One feature of the coronavirus pandemic has been a sharp increase in the number and severity of ransomware attacks. According...
Read more about Ransomware insurance: the costs of a clean-up
IndieFlix streaming service leaves thousands of confidential agreements, filmmaker SSNs, videos exposed on public server
In order to increase efforts to secure customer and client data, IndieFlix will be “immediately dedicating time and resources towards...
Read more about IndieFlix streaming service leaves thousands of confidential agreements, filmmaker SSNs, videos exposed on public server
Are organizations reporting cyberattacks more?
Across a few articles since the pandemic has erupted across the world, I’ve noted how cyberattacks have been on the...
Read more about Are organizations reporting cyberattacks more?
Why there are no winners in a tech cold war between China and the West
When China recently introduced its new national security law for Hong Kong, many predicted a turbulent future for tech and social media...
Read more about Why there are no winners in a tech cold war between China and the West
What is social engineering?
Social engineering is the act of manipulating people into revealing confidential information. Fraudsters may impersonate someone else or steal other...
Read more about What is social engineering?
We think it’s other people that fall for online scams
The rise in cybersecurity attacks during the coronavirus pandemic has been well documented. It’s been a perfect storm of vast...
Read more about We think it’s other people that fall for online scams
Top myths about malware, ransomware, and spyware
One of the downsides of always being connected is the constant threat of malicious software and threats that come in...
Read more about Top myths about malware, ransomware, and spyware
Critical US infrastructure can be hacked by anyone
Our research found that both public and private infrastructure in the US is still unprotected and easily accessible to hackers - with no passwords at all.
Read more about Critical US infrastructure can be hacked by anyone
New Zealand property management company leaks 30,000 users’ passports, driver’s licenses and other personal data
CyberNews received information from reader Jake Dixon, a security researcher with Vadix Solutions, who discovered an unsecured Amazon Simple Storage...
Read more about New Zealand property management company leaks 30,000 users’ passports, driver’s licenses and other personal data