Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Additionally, the ability to protect data and code is limited in conventional computing infrastructure.
Not all internet users are careless about their online security. But many are still victims of cybercriminals and stalkers due to mistakes online.
- By Waqas Baig
- May 18, 2020
With growing number of breaches, there is a huge need for more advanced measures to protect public sector data.
- By Warren Poschman
- May 12, 2020
Endpoints are common targets for ransomware and cryptojacking attackers. Here are the solutions available to address those risks.
- By Ilai Bavati
- May 11, 2020
The Star Wars series provides good examples that we can use as lessons to combat scammers attempting to profit from COVID-19, writes Tyler Reguly.
- By Tyler Reguly
- May 04, 2020
After customers reported fraudulent purchases, Nintendo announced that a credential stuffing campaign led to breaches of thousands of accounts.
- By Haley Samsel
- Apr 27, 2020
Nearly 450 active email addresses and passwords used by WHO staff have been leaked online, and the public has received email scams from people posing as staff.
- By Ralph C. Jensen
- Apr 24, 2020
In order to address vulnerabilities and risks, security teams must enable privileged access management and automate security tools, among other tips.
- By Eddie Segal
- Apr 23, 2020
Nearly 8,000 applicants to a Small Business Administration loan program may have had their data shown to other users filling out the application.
- By Haley Samsel
- Apr 22, 2020
Officials handled an attack that disabled access to state agency databases just a few weeks before the state became the epicenter of the COVID-19 crisis.
- By Haley Samsel
- Apr 20, 2020
The app will make it easier for individuals and public health officials to track the spread of COVID-19, but privacy rights groups are pushing for transparency.
- By Haley Samsel
- Apr 13, 2020
Business email compromise attacks continue to be effective, tricking victims into transferring funds to fraudulent accounts.
- By Haley Samsel
- Apr 09, 2020
How to improve client and employee trust, collaborate across departments and reduce costs through SOCs
- By Gilad David Maayan
- Apr 07, 2020
School districts are increasingly turning to Google for online classroom tools during the coronavirus pandemic, but the company has faced scrutiny for the data it collects on students.
- By Haley Samsel
- Apr 07, 2020
After experiencing an unprecedented growth in users over the course of a month, the video conferencing app is hoping to address complaints of “Zoombombing” and improper data collection.
- By Haley Samsel
- Apr 03, 2020
The spread of “Zoombombing,” or hijacking a meeting room with abusive images or speech, has grown in scope as more Americans turn to teleconferencing for classroom instruction and workplace meetings.
- By Haley Samsel
- Apr 02, 2020
The hack took place through Marriott Bonvoy, the company's loyalty app, and affected up to 5.2 million guests.
- By Haley Samsel
- Apr 01, 2020
Cyber attackers have already attempted to profit off of spam websites selling fake coronavirus cures. Now, hackers will turn toward Americans’ thirst for information about stimulus checks and financial aid.
- By Haley Samsel
- Mar 31, 2020
A malicious site imitating the WHO’s email system was created to collect the account information of the organization’s employees.
- By Haley Samsel
- Mar 26, 2020
A federal judge granted a temporary restraining order to have a website selling fake vaccine kits shut down immediately.
- By Haley Samsel
- Mar 24, 2020