Email
Password
Remember meForgot password?
    Log in with Twitter

Cybersecurity News

Microsoft bug shows importance of a zero trust protocol Special

A recently identified cyber-risk connected to Microsoft’s login systems shows the risk with trusting known vendors for enterprise cybersecurity. A security expert tells Digital Journal that a 'zero trust' approach is the best security measure to adopt.

Sweaty Betty's suffers eCommerce data breach Special

Sweaty Betty’s has suffered from a data breach, caused by cyber-criminals inserting malicious code into its eCommerce website to capture customer card details during the checkout process.

Major Android bug discovered targeting banking apps Special

A dangerous Android vulnerability known as StrandHogg has been discovered by Promon, affecting all Android devices. Sam Bakken of OneSpan looks at the new risk to smartphone users.

New report outlines key business cybersecurity trends for 2020

The rapidly evolving cybersecurity landscape proves that threat actors remain undeterred from compromising systems for their own gain. A new report from Trend Micro presents the key cybersecurity concerns for businesses for 2020.

Q&A: When hackers have your healthcare IT department outgunned Special

Keeping on top of regulations is a burdensome task for any healthcare IT department, including HIPAA compliance, especially when cash-strapped or low in headcount. So what can they do? Max Pruger of Kaseya has some answers.

Online shoppers beware: New mobile banking Trojan appears Special

A new strain of mobile banking Trojan called Ginp has been constantly refined to collect login credentials and credit card details, warns Will LaSala, Director of Security Services at OneSpan.

Q&A: Disrupting data ownership practices among software vendors Special

Ever since the Cambridge Analytica/Facebook scandal, privacy, protection and data ownership have been top of mind for consumers and leaders in the tech industry, says industry expert Jon Roskill.

Oracle EBS flaws leave half of customers exposed Special

An estimated 10,000 enterprises worldwide are at serious risk of financial fraud thanks to critical security vulnerabilities in Oracle EBS software, notes commentator Piyush Pandey.

PayMyTab suffers from data leak Special

PayMyTab have reported on a data leak that exposes personal information belonging to mobile diners. Information was leaked, including customer names, email addresses, telephone numbers, order details, restaurant visit information.

Q&A: Cybersecurity must be a priority in M&A strategies Special

The mergers and acquisitions process is critical. Companies are using different clouds and containers – which add to the complexity. Anurag Kahol provides Digital Journal readers with the main cyber-risks faced by companies undergoing the M&A process.

Q&A: Protecting digital assets with mathematics Special

Today's digital businesses require a new kind of trust paradigm. As physical and virtual worlds intersect, there is a growing number of security and privacy challenges. Unbound Tech is offering a new form of security and privacy.

Report finds cloud adoption exceeds necessary security measures

Bitglass has released its fifth annual, V for Vendetta-themed Cloud Adoption report. Key findings include that even as the use of cloud apps has grown extensively over the past 12 months, few companies have implemented single-sign on.

Looking behind the ConnectWise ransomware attacks Special

ConnectWise has announced that hackers have targeted on-premise Automate systems so they can take over servers and then deploy ransomware across a company's entire computer fleet. James Carder of LogRhythm Labs explains more.

New phishing attacks impersonating the law departments Special

In response to the recent phishing attacks impersonating the U.K. Ministry of Justice, security expert Alexander García-Tobar, CEO and co-founder, Valimail delves into the issue for Digital Journal.

From cyberattacks to privacy issues: Top predictions for 2020 Special

From risks around cloud misconfiguration, to new and emerging threats by hackers, 2020 poses some real dangers to businesses. Chris DeRamus, CTO and co-founder, DivvyCloud provides an insight as to the challenges that next year presents.

Adobe Creative Cloud account caught in data exposure Special

News has been released about Adobe’s exposure of 7.5 million Creative Cloud accounts. In response to this latest cloud computing data issue, Alexander García-Tobar, CEO and co-founder of Valimail provides his thoughts.

Report predicts rise in cyber threats in the eSports Industry

Trend Micro has released a report analyzing the current threat landscape to predict how cybercriminals will target the eSports industry, the sponsors and players. As the eSports industry continues to grow, so too does the threat risk.

Cybersecurity: The biggest risk can be from the inside

When it comes to cybersecurity risks, arguably as many risks exist inside the organization (intentional or otherwise) as exist outside of the organization, in terms of risk from hacking. Some of the main insider risks are discussed.

Six key security predictions for businesses for 2020 Special

Cybersecurity issues have been on the increase during 2019 and 2020 shows no sign of these slowing down. Indeed, the number of issues facing businesses is actually set to increase, according to Anurag Kahol of Bitglass.

CenturyLinks' suffers data breach with cloud computing system Special

CenturyLink has reported that a customer information database of 2.8 million records was found exposed. The database was affiliated with a third-party notification platform and has been exposed for 10 months.

Q&A: Preparing security operations for the next generation Special

With enterprise attacks increasing, how can a Security Operations Center deal with myriad of threats. This comes down to having the right tools and strategy in place, explains Vinay Sridhara, the CTO of Balbix.

The reason behind the Samsung fingerprint spoof Special

A major weakness with Samsung devices was recently highlight - hackers can use screen protectors to allow for any fingerprint to be used to unlock any Samsung smartphone. Philipp Pointner, Chief Product Officer, Jumio provides analysis.

NCSC report reveals 1 million payment card fraud cases thwarted Special

The NCSC’s annual report reveals that has thwarted more than one million cases of suspected payment card fraud in the last year. OneSpan’s Mark Crichton, Senior Director Security Product Management provides an assessment.

Q&A: Are biometrics essential for cybersecurity? Special

Passwords continue to instill the most confidence in its ability to protect against identity theft and online fraud, based on a new survey. However, biometrics is on the rise. How should businesses adapt?

The big cybersecurity stories you need to know about

Each year, cybersecurity companies publish a number of research reports focusing on different aspects of cybersecurity and breach trends. We review some of the most alarming statistics from 2019.

Data leak exposes more than 200K job seeker CVs Special

Two recruitment firms, US-based Authentic Jobs and UK-based Sonic Jobs, exposed more than 200K job seekers’ CVs. Stephan Chenette, Co-Founder and CTO, AttackIQ provides analysis.

Travel apps come up 100% failure of security standards Special

A study into the world’s most popular travel apps has shown them to have a 100 percent failure rate by OWASP standards. This means vulnerabilities for consumers and travel service providers, according to John Aisien, CEO of Blue Cedar.

A look at the largest data breaches over the past 15 years

A new study put together by Kastle Systems looks at the largest data breaches over the past 15 years within the U.S.. The findings highlight which industries and organizations have had the most data breaches.

Majority of IT security pros say their infrastructure has gaps

New research from Ponemon Institute and AttackIQ has discovered that 56 percent of IT security professionals understand their organization’s security infrastructure has gaps in coverage. This could allow attackers to penetrate system defences.

Q&A: Former NSA Chinese espionage expert details cyber-threats Special

Charity Wright, former NSA Chinese espionage expert, and current threat researcher with global threat intelligence firm, IntSights, has released a new analysis on Chinese influencer campaigns. Charity shares with Digital Journal the main findings.
  1 2 3 4 5 6 ... 16 Next»

Set up a news alert for

Cybersecurity


Cybersecurity Image

This strong password was created by typing several random letters  numbers and symbols on the keyboa...
This strong password was created by typing several random letters, numbers and symbols on the keyboard
cups.cs.cmu.edu
Windows Defender Dofil cybersecurity response
Windows Defender Dofil cybersecurity response
Microsoft
Gregg Garrett is the Head of International Cybersecurity with BDO USA  LLP  one of the nation’s le...
Gregg Garrett is the Head of International Cybersecurity with BDO USA, LLP, one of the nation’s leading professional services organizations.
BDO USA
Anything connected to the internet -- from smartphones to power plant controllers -- can be manipula...
Anything connected to the internet -- from smartphones to power plant controllers -- can be manipulated, a Dutch military cyber official said
ODD ANDERSEN, AFP/File
NATO has two rapid reaction teams on standby  armed with fast computers with vulnerability-analysis ...
NATO has two rapid reaction teams on standby, armed with fast computers with vulnerability-analysis code, forensic software and special database management tools 
DAMIEN MEYER, AFP/File
Samy Kamkar s $5 Raspberry Pi Zero-based  PoisonTap  hacking tool
Samy Kamkar's $5 Raspberry Pi Zero-based "PoisonTap" hacking tool
Samy Kamkar
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
A hacker in action.
A hacker in action.
Davide Restivo (CC BY-SA 2.0)
MIT President  Dr. L Rafael Reif (on left) and IBM Senior Vice President  Cognitive Solutions and Re...
MIT President, Dr. L Rafael Reif (on left) and IBM Senior Vice President, Cognitive Solutions and Research, Dr. John Kelly III (on right), reach a 10-year, $240 million agreement to establish the MIT and IBM Watson AI Lab where fundamental joint research in AI hardware and software will be conducted to propel scientific breakthroughs that will unlock the potential of AI.
MIT and IBM Watson AI Research Lab
Five models and three different generations of security token devices for online banking. The newer ...
Five models and three different generations of security token devices for online banking. The newer models are in the foreground.
M0tty
Critics say the GDPR could take away an important tool used by law enforcement  security researchers...
Critics say the GDPR could take away an important tool used by law enforcement, security researchers, journalists and others.
Thomas Samson, AFP/File
External cyber attacks targeting France's military double each year and the country blocked 24 ...
External cyber attacks targeting France's military double each year and the country blocked 24,000 of them in 2016
Pascal Pochard-Casabianca, AFP/File
Unsecured Tesla Kubernetes console
Unsecured Tesla Kubernetes console
RedLock
Untitled
Loic Venance, AFP
IBM Security instructors at the company’s security business headquarters  simulate cyber attacks i...
IBM Security instructors at the company’s security business headquarters, simulate cyber attacks in the world’s first commercial cyber range at the IBM X-Force Command Center in Cambridge, Mass.
MIT and IBM Watson AI Research Lab (CC BY-ND 2.0)
No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
The tool s response to using  testpassword  as a password
The tool's response to using "testpassword" as a password
Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
PICTFOR
Malicious subtitle files could compromise computers  security researchers warned today
Malicious subtitle files could compromise computers, security researchers warned today
Check Point Security
Air Force Cyber Command Center
Air Force Cyber Command Center
U.S. Air Force

Latest News
Top News