The state suspects that the attack, which took place Friday morning and targeted small local governments, was coordinated by “one single threat actor.”
- By Haley Samsel
- Aug 20, 2019
Neglecting basic security practices exposes companies to long-standing security threats.
- By Gilad David Maayan
- Aug 19, 2019
In a search of Paige Thompson’s home, federal agents found servers holding stolen data from other companies and an “arsenal of weapons” belonging to her roommate.
- By Haley Samsel
- Aug 16, 2019
Suprema, which operates the Biostar 2 biometric smart lock system, leaked over 27.8 million records in a publicly accessible database discovered by security researchers.
- By Haley Samsel
- Aug 15, 2019
Cameras could be high-priority targets because owners are more likely to pay to get their valuable photos back, researchers said.
- By Haley Samsel
- Aug 13, 2019
Deploying automated decoys can help protect your network and reduce IT costs.
- By Gilad David Maayan
- Aug 12, 2019
Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients.
- By Bud Broomhead
- Aug 08, 2019
Why corporations owe it to you and society as a whole to stop data breaches and fraud
- By Simon Marchand
- Aug 05, 2019
Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network
- By Yotam Gutman
- Aug 05, 2019
How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests
- By Evan Francen
- Aug 02, 2019
The term “bad actor” once only referred to someone making a living in Tinsel Town. Now governments have used those words to describe rogue operators who carry out missions or perform actions with the intent to weaken or harm a country for the good of another.
- By Richard Kanadjian
- Aug 01, 2019
A lone attacker is accused of stealing personal information that included bank account numbers and Social Security numbers.
- By Haley Samsel
- Jul 31, 2019
An employee spoke out due to their concerns about the potential misuse of information by firms working for Apple.
- By Haley Samsel
- Jul 30, 2019
Eliminate trust based on location, such as within a company network, and always verify users at every access request.
- By Yotam Gutman
- Jul 26, 2019
Americans could be signing over the keys to their identity when filling out medical forms that promise to “anonymize” their information, according to a new algorithm developed by scientists.
- By Haley Samsel
- Jul 25, 2019
Security experts and lawmakers say that creating a “backdoor” to unlock devices and messages would make those products vulnerable to hackers.
- By Haley Samsel
- Jul 24, 2019
The credit-reporting agency will pay at least $300 million to victims. But it may be difficult for consumers to prove direct losses from identity theft.
- By Haley Samsel
- Jul 23, 2019
While healthcare organizations are confidently moving sensitive patient data to the cloud, less than half are encrypting that information.
- By Haley Samsel
- Jul 22, 2019
The app, which is based out of Russia, was popular for its ability to make users look older. But critics say there’s a catch.
- By Haley Samsel
- Jul 19, 2019
A state audit found that the personal information of over 1 million students and more than 200,000 teachers was at risk of identity theft.
- By Haley Samsel
- Jul 18, 2019