
Never use free Wi-Fi
This is a conversation I find myself having almost every day and I believe that the message isn’t really sinking in on the dangers of using public or free Wi-Fi.
Craig Ford | 13 May | Read more
This is a conversation I find myself having almost every day and I believe that the message isn’t really sinking in on the dangers of using public or free Wi-Fi.
Craig Ford | 13 May | Read more
Hackers stole data of more than 150 million users of a wildly popular fitness and dietary tracking app MyFitnessPal, as announced by its parent company Under Armour on Thursday, March 29.
Harold Kilpatrick | 09 Apr | Read more
The discovery of a security vulnerability in every implementation of Wi-Fi’s WPA2 standard sent mainstream media into a frenzy, with warnings of a catastrophic impact on Android devices.
David Braue | 24 Oct | Read more
Executives have finally realised that the cybersecurity barbarians are at the gate - but it’s still up to CSOs to muster the technological and human defences to hold them off.
David Braue | 21 Jul | Read more
Trump Hotels admitted that hackers stole credit card and other sensitive data about guests who stayed at 14 Trump properties; the third-party reservation booking system was breached.
As the UK prepares for new surveillance laws, a court has ruled that prior bulk communication data collection was being conducted illegally between 1998 and 2015.
Data breaches are inevitable and waiting for a breach to occur before designing an incident response plan is a recipe for failure. It’s a question of when the breach will occur and how you will respond, not if you will be breached. 100% prevention simply doesn’t exist, so having a plan to deal with a security breach is now more important than ever. You probably already have an incident response plan from a technical perspective. Phrases such as preparation, identification, containment, eradication and lessons learned.
Wayne Tufek | 15 Sep | Read more
One of the key themes coming from this year’s Risk Management and Security Summit, held by Gartner, is that the battle against cybercrime and data theft is as much about resilience and detecting breaches as preventing them. Having the right tools in place to detect a breach or some sort of unauthorised activity is critical.
Anthony Caruana | 31 Aug | Read more
Hackers were looking for campaign strategies and policies
Michael Kan | 15 Jun | Read more
Microsoft has warned IT admins to against policies that require passwords that are too long, require multiple character sets, and force users to change them frequently.
As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattacks.
We've barely begun 2015, yet some security predictions made at the end of last year are already being tested. One of those was a prediction by RSA that criminals will turn their attention to stealing personal health information, and the recent attack on US health insurer Anthem, is just one symptom that it might be happening sooner than our initial diagnosis.
Michael Lee | 12 Feb | Read more
South Korean authorities have revealed details surrounding massive data breach that impacts 27 million people aged 15-65. The compromised data comes from website registrations for various games and online gambling promotions, ringtone storefronts, and movie ticketing.
Steve Ragan | 25 Aug | Read more
Hackers broke into a server used by the Apache Software Foundation to keep track of software bugs.
Robert McMillan | 15 Apr | Read more
As his parents and sister silently wept, hacker mastermind Albert Gonzalez was sentenced Thursday in U.S. District Court to two concurrent 20-year stints in prison for his role in what prosecutors called the "unparalleled" theft of millions of credit and debit card numbers from major U.S. retailers.
Nancy Weil | 26 Mar | Read more