The connected nature of these products creates unintentional ports to other sensitive and critical systems, data and devices.
SandJacking Attack Can Replace iOS Apps with Malicious Versions
Apple has yet to release a patch
Human Error to Blame as UK Data Breaches Soar
Egress FoI request shows healthcare is once again the worst offender
Cyber OpSec: A Critical Piece in the Battle for Security
Bad guys use operational security to avoid detection and retain attack infrastructure; good guys use it to deny adversaries critical information.
European Data Protection Supervisor Rejects Privacy Shield
Deal should not be ratified in current form, says Buttarelli
Over 5,000 FTSE 100 Log-ins Found on Darknet
Anomali research finds widespread reuse of corporate credentials
TRADOC G-2 Call for Papers
U.S. Army TRADOC, SWJ Blog To provide information on the upcoming Mad Scientist Conference to be held at Georgetown University School of Continuing Studies, Washington DC from 8-9 August…
CEO Sacked After $56 Million Whaling Attack
First major casualty of new breed of email scam
Data from 360 Million MySpace Accounts Stolen
Info can be purchased on criminal forums.
Tumblr Breach Hit 65 Million as Pattern Emerges
Could there be a link between this and LinkedIn, MySpace breaches?