
Data breach involving 16 billion credentials is not what it seems
When news broke yesterday morning about a data breach involving 16 billion records, it soon became clear that...
When news broke yesterday morning about a data breach involving 16 billion records, it soon became clear that...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
A new mobile app described as 'Yelp for Conservatives' is leaking user data and business reviews, according to...
The European Parliament has adopted a resolution urging the European Commission and Member States to take acti...
Mimecast wants to further secure companies through its new Threat Center. Experts from the security company ke...
Companies that use Box as a cloud-based file hosting and sharing system may accidentally leak their internal f...
Avast and Emsisoft provide free decryption software to those affected by the BigBobRoss version of ransomware....
A smart car alarm should make it harder to steal a vehicle. However, a new study shows that in some cases, the...
Trend Micro researchers say they found a new malware that uses Slack channels, GitHub, and file.io to steal da...
In Jackson County, Georgia, no less than 400,000 dollars (355,624 euros) was paid to cyber criminals. This put...
Thales and Gemalto have been granted an antitrust exemption in the United States. Earlier this month, the two ...
Security researchers Bob Diachenko and Vinny Troia have discovered a publicly accessible database owned by an ...