The state suspects that the attack, which took place Friday morning and targeted small local governments, was coordinated by “one single threat actor.”
- By Haley Samsel
- Aug 20, 2019
Neglecting basic security practices exposes companies to long-standing security threats.
- By Gilad David Maayan
- Aug 19, 2019
In a search of Paige Thompson’s home, federal agents found servers holding stolen data from other companies and an “arsenal of weapons” belonging to her roommate.
- By Haley Samsel
- Aug 16, 2019
Suprema, which operates the Biostar 2 biometric smart lock system, leaked over 27.8 million records in a publicly accessible database discovered by security researchers.
- By Haley Samsel
- Aug 15, 2019
Cameras could be high-priority targets because owners are more likely to pay to get their valuable photos back, researchers said.
- By Haley Samsel
- Aug 13, 2019
Deploying automated decoys can help protect your network and reduce IT costs.
- By Gilad David Maayan
- Aug 12, 2019
Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients.
- By Bud Broomhead
- Aug 08, 2019
Why corporations owe it to you and society as a whole to stop data breaches and fraud
- By Simon Marchand
- Aug 05, 2019
Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network
How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests
- By Evan Francen
- Aug 02, 2019
The term “bad actor” once only referred to someone making a living in Tinsel Town. Now governments have used those words to describe rogue operators who carry out missions or perform actions with the intent to weaken or harm a country for the good of another.
- By Richard Kanadjian
- Aug 01, 2019
A lone attacker is accused of stealing personal information that included bank account numbers and Social Security numbers.
- By Haley Samsel
- Jul 31, 2019
An employee spoke out due to their concerns about the potential misuse of information by firms working for Apple.
- By Haley Samsel
- Jul 30, 2019
Eliminate trust based on location, such as within a company network, and always verify users at every access request.
Americans could be signing over the keys to their identity when filling out medical forms that promise to “anonymize” their information, according to a new algorithm developed by scientists.
- By Haley Samsel
- Jul 25, 2019
Security experts and lawmakers say that creating a “backdoor” to unlock devices and messages would make those products vulnerable to hackers.
- By Haley Samsel
- Jul 24, 2019
The credit-reporting agency will pay at least $300 million to victims. But it may be difficult for consumers to prove direct losses from identity theft.
- By Haley Samsel
- Jul 23, 2019
While healthcare organizations are confidently moving sensitive patient data to the cloud, less than half are encrypting that information.
- By Haley Samsel
- Jul 22, 2019
The app, which is based out of Russia, was popular for its ability to make users look older. But critics say there’s a catch.
- By Haley Samsel
- Jul 19, 2019
A state audit found that the personal information of over 1 million students and more than 200,000 teachers was at risk of identity theft.
- By Haley Samsel
- Jul 18, 2019