Researchers still bemused as to its purpose
Winners Crowned in DCMS Cyber Security Innovation Competition
On Thursday March 27, 20 small cybersecurity companies went head-to-head in the Cyber Security Innovation Competition, each pitching themselves for the opportunity to win one of 14 places to feature in the DCMS UK Cyber Innovation Zone at Infosecurity …
How to reduce the consequences of Data Breach
The storing and processing of data sets that contain personally identifiable information (PII) is increasingly regulated and is subject to onerous notification requirements when data breaches occur. Such data includes health information, finan…
Shadow Brokers Attack Tools Light Up Chinese and Russian Darknet
Hackers keen to exploit this treasure trove of data
NoTrove Threat Actor Emerges with Millions of Scam Ads
Ad scams can be used to download potentially unwanted programs and can redirect users to unwanted places.
Hyundai Mobile App Flaw Allows Bad Guys to Unlock and Start the Car
Bad actors can also access personal information, including the user’s username, password, PIN and historical GPS data about the vehicle’s location.
Orgs Leave Thousands of Sensitive Files Open to Employees
47% of organizations were found to have at least 1,000 sensitive files accessible to every employee.
It always comes to this: why making the right security designs up front matters.
When we started WiKID, we knew we had to be as secure as or more secure than the leading players at the time (RSA, Vasco, mostly, way back then). We decided that using asymmetric keys generated on users’ devices was the best way to overcome objections …
Chipotle Reports Suspicious Activity on POS System
Chipotle has detected “unauthorized activity” on a network that supports its payment processing for purchases made at its restaurants
DNC Hacking Group Aims Sights at Macron
French presidential hopeful and German political groups targeted by Pawn Storm