Users are tricked into entering personal and financial details
From the Core to the Edge: 3 Security Imperatives and the Evolving Digital Topology
The breathtaking pace at which everyone and everything is becoming connected is having a profound effect on digital business, from delivering exceptional experiences, to ensuring the security of your customers, applications, and workforce….
Malware in Flappy Birr App Flies Away with Data
Spyware in disguise passes for legitimate Android apps in Google Play.
Phishing Template Uses Fake Fonts
A first-of-its kind phishing template exploits web font features, says Proofpoint.
Marriott Hackers Got Millions of Passports Numbers
As the investigation continues, Marriott issues a data breach update.
Millions of Tower of Salem Gamers Hit by Breach
Data stolen includes IP addresses, emails and hashed passwords
German Politicians Caught in Massive Data Leak
Only far right politicians appear to have been spared
US Cloud Hoster Receives Christmas Ransomware ‘Gift’
Data Resolution claims to be victim of Ryuk strain
Life at Akamai: Making Connections
By the numbers, Akamai’s scale, reach and ability to help brands connect users to immersive and immediate online experiences while protecting their businesses from threats, is quite impressive. While I’m proud that Akamai connects with billions of devi…
Low, Medium and High Interaction Honeypot Security
Honeypots are a popular way to protect data centers and learn about attackers. Learn the difference between high and low interaction honeypot security.