Email
Password
Remember meForgot password?
    Log in with Twitter

Cybersecurity News

Travel apps come up 100% failure of security standards Special

A study into the world’s most popular travel apps has shown them to have a 100 percent failure rate by OWASP standards. This means vulnerabilities for consumers and travel service providers, according to John Aisien, CEO of Blue Cedar.

A look at the largest data breaches over the past 15 years

A new study put together by Kastle Systems looks at the largest data breaches over the past 15 years within the U.S.. The findings highlight which industries and organizations have had the most data breaches.

Majority of IT security pros say their infrastructure has gaps

New research from Ponemon Institute and AttackIQ has discovered that 56 percent of IT security professionals understand their organization’s security infrastructure has gaps in coverage. This could allow attackers to penetrate system defences.

Q&A: Former NSA Chinese espionage expert details cyber-threats Special

Charity Wright, former NSA Chinese espionage expert, and current threat researcher with global threat intelligence firm, IntSights, has released a new analysis on Chinese influencer campaigns. Charity shares with Digital Journal the main findings.

Q&A: How to future-proof your privacy policy Special

Organizations must begin to view regulatory compliance as a floor for security rather than a ceiling, focusing on protecting customer data instead of just addressing the requirements demanded by regulations, according to Jacob Serpa of Bitglass.

New Research: Most enterprise email domains are vulnerable

The standards for Internet email have never evolved to include robust sender identity validation. As cyber-attack become more sophisticated, this places enterprises at an increased risk, according to a new report from Valimail.

New Survey: Majority of IT departments have gaps in USB security

While there are many sources of cybersecurity weakness, employees pose a major threat to their organizations’ data security, and a major contributor is employees’ usage of USB drives.

Indiana health system breach impacts 68K patients Special

Indiana-based Methodist Hospitals is currently notifying 68,039 patients that their protected health information may have been exposed in a data breach. Peter Goldstein, CTO and co-founder, Valimail provides an assessment.

Major Zynga data breach reported Special

With the Zynga data breach it is estimated that 218 million accounts have been compromised, with players’ names, email addresses, login IDs, hashed passwords, and phone numbers thought to be exposed. Frederik Mennes at OneSpan looks into the issue.

Q&A: Hackers access files from the sound of keystrokes Special

An alarming new report finds that hackers can crack a password by recording keystroke sounds and using software to work out the combinations that have been used. Expert Ivan Blesa looks into the issue.

DoorDash data breach exposes 4.9 million users' details Special

DoorDash has confirmed a data breach impacting 4.9 million users including customers, delivery workers and merchants. The food delivery company said that the breach happened on May 4 and that customers who joined after April 5, 2019 are not affected.

Q&A: Businesses need to face up to cybersecurity skills shortage Special

A new report on the cybersecurity skills shortage finds that the majority of cybersecurity professionals felt that organizations do not know what they need and that recruiters do not understand the field in which they are tasked in finding candidates.

YouTube warns of major phishing hack in progress Special

YouTube Vloggers appear to be the the latest target of coordinated phishing attacks, YouTube warns. Hackers used phishing emails to lure victims on fake Google login pages in order to steal credentials.

A new phishing campaign is targeting Instagram users Special

A new phishing campaign targeting Instagram users by luring them into providing their credentials using fake copyright infringement alerts--implanting a feeling of urgency designed to lower the users' guard. Peter Goldstein of Valimail provides analysis.

Q&A: How cloud computing protects Canadians against hackers Special

Canadian firm NuData uses biometrics to confirm that a person online is really who they say they are, even if the password they’re using is correct. To discover more, Digital Journal spoke with Justin Fox who leads DevOps at NuData.

Click2Gov hit by second breach impacting 20,000 payment records Special

After being hit by a significant breach in the past years, Click2Gov, a self-service bill-pay portal for utilities, community development and parking tickets, suffers from another breach impacting over 20,000 payment records from eight cities.

Major databreach exposes data on most of Ecuador's citizens Special

An Elasticsearch server has leaked personal data on almost all of Ecuador's citizens, including their family trees, and children, plus some financial records and car registration information. Anurag Kahol of Bitglass assesses the situation.

Q&A: In a hyperconnected world, how we secure the digital now? Special

From smart homes to smart cities, connected technology has permeated into the most intimate units of human life. At the same time comes the risk of increased cyberattacks, according to expert Myla Pilao.

First international standard for data privacy published

The first international standard aimed at tackling privacy information management head on has been published by the International Standards Organization (ISO). The standard addresses the privacy issues relating to a connected world.

Cobalt Dickens attacks on rise and aimed at universities Special

A new Cobalt Dickens phishing campaign has been targeting universities. To understand the implications behind this, security expert Peter Goldstein, CTO and co-founder of Valimail provides some analysis.

Inadequate IT infrastructures are a source of global cyber risk

Data privacy specialists at StorageCraft have issued an international research study looking into the experiences of IT decision-makers in relation to data management. The study reveals concerns about the business risk from unrestricted data growth.

Q&A: How did Facebook come to expose users' data online? Special

Hundreds of millions of phone numbers linked to Facebook accounts were found online. This represents the latest in a string of security and privacy incidents involving Facebook, according to Jonathan Bensen, CISO at Balbix.

Interview: The consultant who discovered Cisco’s FTD Bug Special

A vulnerability in Cisco's Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive, private data. We speak to the man who discovered the issue.

DMVs found to be selling driver data to 1000s of companies Special

Departments of Motor Vehicles in various U.S. states are selling drivers' personal information to businesses. Some sales are pre-approved, but in some cases data has been sold to more nefarious businesses as well. Eve Maler provides some insight.

Q&A: A passwordless future for enterprise security? Special

There is a growing shift toward a passwordless future for enterprise security as most hacking-related company breaches are traced back to compromised and weak credentials, according to Matt Davey, COO of 1Password. But is this the right option?

The reason behind the Glynk Android app leak Special

Following a data breach, up to one million people could be at an increased risk of phishing attacks following the app Glynk’s leak of 2.2 billion rows of data. Chris DeRamus of DivvyCloud explains more.

Facebook users' phone numbers exposed online Special

Hundreds of millions of phone numbers linked to Facebook accounts were found online. The passwordless server contained over 419 million records over several databases on users across geographies. Jonathan Bensen, CISO at Balbix looks at the implications.

Android 10 promises increased security, but there are risks Special

A leading security expert explains why the release will still leave security issues, some of which is tied to the behaviors of late adopters.

Google to expand its bug bounty program to counter hackers Special

Google has announced it’s making changes to its Google Play Security Reward Program (GPSRP) by expanding its bug bounty program to include popular third-party apps that have 100 million or more installs. This reflects new concerns.

iPhone flaw shows ongoing concerns with mobile devices Special

Researchers working at Google’s Project Zero have discovered several hacked websites which used cybersecurity flaws to indiscriminately attack any iPhone that visited them. This is the biggest attack yet reported against iPhone users.
  1 2 3 4 5 6 ... 15 Next»

Set up a news alert for

Cybersecurity


Cybersecurity Image

Windows Defender Dofil cybersecurity response
Windows Defender Dofil cybersecurity response
Microsoft
A sample of WordPress pages defaced by hacking group w4l3XzY3
A sample of WordPress pages defaced by hacking group w4l3XzY3
No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple
Samy Kamkar s $5 Raspberry Pi Zero-based  PoisonTap  hacking tool
Samy Kamkar's $5 Raspberry Pi Zero-based "PoisonTap" hacking tool
Samy Kamkar
Unsecured Tesla Kubernetes console
Unsecured Tesla Kubernetes console
RedLock
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
MIT President  Dr. L Rafael Reif (on left) and IBM Senior Vice President  Cognitive Solutions and Re...
MIT President, Dr. L Rafael Reif (on left) and IBM Senior Vice President, Cognitive Solutions and Research, Dr. John Kelly III (on right), reach a 10-year, $240 million agreement to establish the MIT and IBM Watson AI Lab where fundamental joint research in AI hardware and software will be conducted to propel scientific breakthroughs that will unlock the potential of AI.
MIT and IBM Watson AI Research Lab
Five models and three different generations of security token devices for online banking. The newer ...
Five models and three different generations of security token devices for online banking. The newer models are in the foreground.
M0tty
IBM Security instructors at the company’s security business headquarters  simulate cyber attacks i...
IBM Security instructors at the company’s security business headquarters, simulate cyber attacks in the world’s first commercial cyber range at the IBM X-Force Command Center in Cambridge, Mass.
MIT and IBM Watson AI Research Lab (CC BY-ND 2.0)
Untitled
Philippe HUGUEN, AFP/File
Critics say the GDPR could take away an important tool used by law enforcement  security researchers...
Critics say the GDPR could take away an important tool used by law enforcement, security researchers, journalists and others.
Thomas Samson, AFP/File
Air Force Cyber Command Center
Air Force Cyber Command Center
U.S. Air Force
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
Pixabay / Pexels
Malicious subtitle files could compromise computers  security researchers warned today
Malicious subtitle files could compromise computers, security researchers warned today
Check Point Security
External cyber attacks targeting France's military double each year and the country blocked 24 ...
External cyber attacks targeting France's military double each year and the country blocked 24,000 of them in 2016
Pascal Pochard-Casabianca, AFP/File
Anything connected to the internet -- from smartphones to power plant controllers -- can be manipula...
Anything connected to the internet -- from smartphones to power plant controllers -- can be manipulated, a Dutch military cyber official said
ODD ANDERSEN, AFP/File
Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
PICTFOR
Gregg Garrett is the Head of International Cybersecurity with BDO USA  LLP  one of the nation’s le...
Gregg Garrett is the Head of International Cybersecurity with BDO USA, LLP, one of the nation’s leading professional services organizations.
BDO USA
This strong password was created by typing several random letters  numbers and symbols on the keyboa...
This strong password was created by typing several random letters, numbers and symbols on the keyboard
cups.cs.cmu.edu

Latest News
Top News