Email
Password
Remember meForgot password?
    Log in with Twitter

Cybersecurity News

Q&A: Time to reform Canada's data privacy laws? Special

Do Canadians have “the right to be forgotten?” Canada’s privacy watchdog plans to ask the Federal Court for clarity and at the same time this is being challenged by Google. Expert Éloise Gratton weighs in.

Huazhu Hotels investigating potential loss of guest data

A leading Chinese hotel group - Huazhu Hotels - is investigating a serious leak of millions of guests' data. This follows millions of its customers' records appearing for sale on the Internet.

Q&A: Why cybersecurity needs to be part of digital transformation Special

To advance with digital transformation, a robust approach cybersecurity is needed. This goes hand-in-hand with company strategy as more firms go down the DX path. Jumio Head of Global Marketing Dean Nicolls provides some insights.

Security vulnerabilities at AT&T, T-Mobile and Sprint

Security analysts have detected security flaws with systems at AT&T, Sprint, and T-Mobile. These security issues could have resulted in customer data being accessible to hackers. The issue at each telecommunications company was unrelated.

Improved security for cloud-based machine learning

Boston - Through a new approach involving the combination of two encryption techniques, researchers have strengthened the security that protects private data, while also enabling neural networks to run quickly.

Russian hackers went after conservative US groups: Microsoft

Washington - Russian government hackers tried to hijack the websites of conservative US think tanks, Microsoft said Tuesday, raising fresh alarms over widening efforts by Moscow to sow discord in US politics.

Russian hackers went after conservative US groups: Microsoft

Washington - The Russian hacking unit that tried to interfere in the US presidential election has been targeting conservative US think tanks, Microsoft said.

Microsoft's new cybersecurity framework

Microsoft's has developed a new framework could help policymakers better understand cybersecurity. The set of tools and associated research paper draw upon many years of expertise collected by the technology giant.

Top ten cybersecurity startup vendors revealed

The biggest cybersecurity investment rounds have been reviewed for 2018 so far, and the top ten leading startups have been identified in this expanding technology sector.

New security flaw with Intel processors

Saarburg - A new security flaw has been detected by German researchers in relation to Intel. This comes on the back of earlier concerns from January and March 2018. The flaw means that passwords can potentially be stolen.

Cisco set to acquire 2FA provider Duo Security

Networking hardware company Cisco announced its plans to buy two factor authorization provider Duo Security for a combination of cash and equity awards.

Q&A: Insights into recent global malware attacks Special

Stealing data, credentials, payment information, etc. is a recurring theme in the realm of cybercrime, and much of it is the result of malware. As globalware attacks surpass 9 billion, cyber threats are dominating many business priorities.

Amazon and Wikipedia still giving poor password advice

Plymouth - A decade of research shows that little improvement has been made in the guidance given by leading websites in relation to security and for the protection of privacy data.

Q&A: Cybersecurity risks associated with the smart home Special

Cybersecurity expert Alex Vaystikh recently bought a new dishwasher before realizing that it connects to his Wi-fi to download updates. In an exclusive interview with Digital Journal, Vaystikh expands on smart home risks.

What is the average cost of a data breach?

IBM Security and Ponemon Institute released their study on the average cost of a data breach. In it they found that data breaches are only going up in cost, and in the volume of records stolen.

AI has the potential to reduce cyberattacks: Interview Special

As data becomes more pervasive and more accessible, cybersecurity and privacy concerns continue to be on the rise as well. Can AI can continue to advance without risking highly personal and valuable information? Dan Baird of Wrench.AI shares his views.

AT&T to acquire threat intelligence company AlienVault

Yesterday telecommunications giant AT&T made a move to bolster security for businesses by announcing its intention to acquire California-based cyberthreat response company Alien Vault.

Insider threats are inherent to every organization

All businesses are at risk from cyberattacks. While much attention is focused externally, a considerable risk exists internally, as new report from LogRhythm indicates.

Cybercriminals are exploiting machine-to-machine communications

Businesses are ever more reliant upon machines, and the range of physical devices on enterprise networks is significant. While this is key to efficiencies it opens up new areas for cyberattack.

Reviewing the impact of the VPNFilter malware attack

A novel VPNFilter malware has affected 500,000 networking devices globally. Marina Kidron, Director of Threat Intelligence in the Skybox Research Lab looks at what is know so far.

Q&A: Why businesses still face cyber risks Special

Vertek Research recently uncovered a leak that exposed over 43 million email addresses to a massive spamming campaign. Why are businesses still vulnerable to this type of attack and what can be done to protect them?

NHS data breach affects 150,000 patients

London - An NHS data breach has affected 150,000 patients in England, according to the British government. The NHS is blaming a coding error. Data was shared for clinical audits and research on the patients who had opted out of any data information sharing.

Q&A: Are IoT devices a security threat? Special

Connected devices are a potential ongoing threat to the security of their users. The main concerns are discussed by IoT security expert Yotam Gutman, who outlines steps that can be followed to avoid becoming a victim of IoT hackers of all types.

Cybersecurity company raises $120 million in latest funding round

Cylance, a provider of cybersecurity-related products and services that markets themselves as being able to prevent attacks years before the attack is even launched, raised $120 million in their Series E funding round.

Cyber thieves claim they have hit two large Canadian banks

Montreal - Bank of Montreal and Canadian Imperial Bank of Commerce said on Monday that cyber attackers may have stolen the data of nearly 90,000 customers in what appeared to be the first significant assault on financial institutions in the country.

RSA 2018 reveals the top five security themes

San Fransisco - The information technology and security community are bombarded with cyberattacks, and also regulations and a quantity of solutions that are difficult to decipher. The recent RSA conference revealed some solutions.

Twitter bug is a reminder that your data is vulnerable

This morning Twitter users opened their accounts to find a prompt asking them to change their password because of a bug in the system. Twitter Inc. is definitely not the only company to have a data protection incident this year, here are a few others.

New International Standard for information security

A revised standard for information security has been issued. This follows the changing landscape in relation to cybersecurity issues and the growing complexity of technology, which brings with it new vulnerabilities.

Russia blocks Telegram app over security concerns

Moscow - Russia has announced plans to block the use of the social media app Telegram over security concerns. This stems from the developers refusing to supply the encryption keys used to scramble messages.

Managing cybersecurity in the age of artificial intelligence

Regardless of if it's computational propaganda, or fake news and videos, or private data leaks, artificial intelligence has increasingly become a real global security challenge.
  1 2 3 4 5 6 ... 12 Next»

Set up a news alert for

Cybersecurity


Cybersecurity Image

No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
IBM Security instructors at the company’s security business headquarters  simulate cyber attacks i...
IBM Security instructors at the company’s security business headquarters, simulate cyber attacks in the world’s first commercial cyber range at the IBM X-Force Command Center in Cambridge, Mass.
MIT and IBM Watson AI Research Lab
MIT President  Dr. L Rafael Reif (on left) and IBM Senior Vice President  Cognitive Solutions and Re...
MIT President, Dr. L Rafael Reif (on left) and IBM Senior Vice President, Cognitive Solutions and Research, Dr. John Kelly III (on right), reach a 10-year, $240 million agreement to establish the MIT and IBM Watson AI Lab where fundamental joint research in AI hardware and software will be conducted to propel scientific breakthroughs that will unlock the potential of AI.
MIT and IBM Watson AI Research Lab
The tool s response to using  testpassword  as a password
The tool's response to using "testpassword" as a password
A sample of WordPress pages defaced by hacking group w4l3XzY3
A sample of WordPress pages defaced by hacking group w4l3XzY3
Malicious subtitle files could compromise computers  security researchers warned today
Malicious subtitle files could compromise computers, security researchers warned today
Check Point Security
This strong password was created by typing several random letters  numbers and symbols on the keyboa...
This strong password was created by typing several random letters, numbers and symbols on the keyboard
cups.cs.cmu.edu
Windows Defender Dofil cybersecurity response
Windows Defender Dofil cybersecurity response
Microsoft
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
PICTFOR
A hacker in action.
A hacker in action.
Davide Restivo (CC BY-SA 2.0)
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
Pixabay / Pexels
Ryan Stolte  Co-founder and CTO of Bay Dynamics.
Ryan Stolte, Co-founder and CTO of Bay Dynamics.
Bay Dynamics
Five models and three different generations of security token devices for online banking. The newer ...
Five models and three different generations of security token devices for online banking. The newer models are in the foreground.
M0tty
Gregg Garrett is the Head of International Cybersecurity with BDO USA  LLP  one of the nation’s le...
Gregg Garrett is the Head of International Cybersecurity with BDO USA, LLP, one of the nation’s leading professional services organizations.
BDO USA
Samy Kamkar s $5 Raspberry Pi Zero-based  PoisonTap  hacking tool
Samy Kamkar's $5 Raspberry Pi Zero-based "PoisonTap" hacking tool
Samy Kamkar
Unsecured Tesla Kubernetes console
Unsecured Tesla Kubernetes console
RedLock
Untitled
By Dwight Burdette (Own work) [CC-BY-3.0 (http://creativecommons.org/licenses/by/3.0)], via Wikimedi
Untitled
Loic Venance, AFP
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple

Latest News
Top News