Email
Password
Remember meForgot password?
    Log in with Twitter

Cybersecurity News

Security expert on Manor ISD $2.3 million phishing email scam Special

Manor Independent School District (located close to Austin, TX) was recently struck by a phishing email scam that resulted in the loss of $2.3 million in ransom payment. Leading security expert Greg Wendt weighs in.

Millions of user records from LimeLeads put up for sale online Special

A new data breach has been reported: 49 million user records from LimeLeads (49 million user records from LimeLeads put up for sale online) have been put up for sale online. Anurag Kahol, CTO, Bitglass looks into the issue.

DivvyCloud announces record results for 2019

Cybersecurity specialist company DivvyCloud has announced record results for 2019 as well as the appointment of Brandie Kalinowski as vice president of people and culture and David Geevaratne as vice president of North American sales.

Security expert on TikTok's security flaws Special

TikTok’s multiple vulnerabilities that allowed attackers to manipulate user accounts and expose personal data including names, email addresses and dates of birth. A security expert details the consequences.

Security predictions for 2020 according to Trend Micro Special

The rapidly evolving cybersecurity landscape proves that threat actors remain undeterred from compromising systems for their own gain. Trend Micro published a report predicting 4 key themes that will define 2020, as Greg Young explains.

Businesses now face a 'vishing' threats Special

2019 has seen a growth in different cyber-threats, many of increased complexity. Threats do not only come via emails and downloads. Machine learning has become sophisticated enough to pose a voice communication threat.

2020 trends for DevOps and IT departments Special

2019 has seen further advance with the DevOps process and supporting technologies. What does 2002 have in store for software development and the roles of different IT functions. An expert from StackRox looks to next year.

Over 60% of leaked records exposed by financial services firms

Which sector of the economy is most closely associated with data breaches? The answer is financial services. Is this because these firms have weak systems or are they the most heavily targeted?

StackRox 2020 predictions: Kubernetes to DevOps Special

The co-founder of StackRox, Ali Golshan, CTO has provided Digital Journal with their predictions for 2020 dealing with things like the growth of Kubernetes and service mesh technology.

New business security 2020 predictions from leading experts Special

Leading tech companies Balbix and LogRhythm have finalized their 2020 cybersecurity predictions for enterprises. Representative from the companies have shared summaries with Digital Journal.

FBI issues warning over public Wi-Fi use Special

As the US enters peak travel season, the Federal Bureau of Investigation has issued a warning to travelers: beware public Wi-Fi. Both enterprises and consumers need to heed the warning, according to expert Sudhakar Ramakrishna.

The key cybersecurity risks set to rise in 2020 Special

As 2019 comes to a close, Dr. Teow-Hin Ngair, CEO/Founder of global cybersecurity biz SecureAge, tells Digital Journal about what to expect in the space heading into 2020.

Cybersecurity insights: definition of vulnerability will broaden Special

According to Gaurav Banga, CEO and founder, Balbix, in 2020 infosec leaders will shift their focus from increasing their overall headcount to improving overall efficiency as the definition of a vulnerability will broaden.

Q&A: DomainTools — 2019 cybersecurity report card survey Special

DomainTools have recently issued their third annual Cybersecurity Report Card survey in which security analysts, threat hunters and other cyber professionals self-grade the security posture of their organizations. We examine the findings.

What you need to know about cybersecurity risk in 2020 Special

What is in store for the realm of technology and cybersecurity in 2020? Issues extend from the risk of ransomware to the possibility of further data breaches. A leading expert provides key advice for businesses and readers at large.

Q&A: Zombie malware is the next big cybersecurity risk Special

There are various forms of malware attacks and the latest to be concerned about is so-called ‘zombie malware’, a type of malware that transforms a computer into a slave so that attacks can be performed remotely.

Top expert cybersecurity predictions for 2020 Special

From the growth in mobile access and muti-channel experiences to new threats from hackers, 2020 looks to be a tricky year for IT professionals tasked with delivering robust cybersecurity. Experts from OneSpan provide analysis.

2020 security predictions that every enterprise needs to note Special

According to security experts at secure access provider Pulse Secure, 'Zero Trust' will continue to gain momentum and an increasing number of technologies will move towards security measures that adapt to the needs of the modern workforce.

2020 security predictions: Redesign of the cyber industry Special

What does 2020 have in store for the cybersecurity sector? Executives at Nominet have made predictions based on industry trends, and have made these available for Digital Journal readers.

Q&A: Sagit Manor on being a female CEO in cybersecurity Special

Sagit Manor of Nyotron is quite different from most CEOs in the cyber sector, her story of how a woman came to run a major cybersecurity operation provides inspiration for many thinking about entering STEM occupations.

New phishing campaign targets gov’t departments around the world Special

Computer analysts have discovered a new type of phishing campaign which attempts to the take login credentials from government departments, targeting almost very civil service center around the world.

Major birth certificate application data exposure Special

Some 750,000 birth certificates in the U.S. have been exposed due to a data breach. In response to the extensive birth certificate application exposure, security expert Robert Prigge, CEO of Jumio looks at the root cause and implications.

Microsoft bug shows importance of a zero trust protocol Special

A recently identified cyber-risk connected to Microsoft’s login systems shows the risk with trusting known vendors for enterprise cybersecurity. A security expert tells Digital Journal that a 'zero trust' approach is the best security measure to adopt.

Sweaty Betty's suffers eCommerce data breach Special

Sweaty Betty’s has suffered from a data breach, caused by cyber-criminals inserting malicious code into its eCommerce website to capture customer card details during the checkout process.

Major Android bug discovered targeting banking apps Special

A dangerous Android vulnerability known as StrandHogg has been discovered by Promon, affecting all Android devices. Sam Bakken of OneSpan looks at the new risk to smartphone users.

New report outlines key business cybersecurity trends for 2020

The rapidly evolving cybersecurity landscape proves that threat actors remain undeterred from compromising systems for their own gain. A new report from Trend Micro presents the key cybersecurity concerns for businesses for 2020.

Q&A: When hackers have your healthcare IT department outgunned Special

Keeping on top of regulations is a burdensome task for any healthcare IT department, including HIPAA compliance, especially when cash-strapped or low in headcount. So what can they do? Max Pruger of Kaseya has some answers.

Online shoppers beware: New mobile banking Trojan appears Special

A new strain of mobile banking Trojan called Ginp has been constantly refined to collect login credentials and credit card details, warns Will LaSala, Director of Security Services at OneSpan.

Q&A: Disrupting data ownership practices among software vendors Special

Ever since the Cambridge Analytica/Facebook scandal, privacy, protection and data ownership have been top of mind for consumers and leaders in the tech industry, says industry expert Jon Roskill.

Oracle EBS flaws leave half of customers exposed Special

An estimated 10,000 enterprises worldwide are at serious risk of financial fraud thanks to critical security vulnerabilities in Oracle EBS software, notes commentator Piyush Pandey.
  1 2 3 4 5 6 ... 17 Next»

Set up a news alert for

Cybersecurity


Cybersecurity Image

This strong password was created by typing several random letters  numbers and symbols on the keyboa...
This strong password was created by typing several random letters, numbers and symbols on the keyboard
cups.cs.cmu.edu
Unsecured Tesla Kubernetes console
Unsecured Tesla Kubernetes console
RedLock
MIT President  Dr. L Rafael Reif (on left) and IBM Senior Vice President  Cognitive Solutions and Re...
MIT President, Dr. L Rafael Reif (on left) and IBM Senior Vice President, Cognitive Solutions and Research, Dr. John Kelly III (on right), reach a 10-year, $240 million agreement to establish the MIT and IBM Watson AI Lab where fundamental joint research in AI hardware and software will be conducted to propel scientific breakthroughs that will unlock the potential of AI.
MIT and IBM Watson AI Research Lab
No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
Malicious subtitle files could compromise computers  security researchers warned today
Malicious subtitle files could compromise computers, security researchers warned today
Check Point Security
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
Pixabay / Pexels
Untitled
Loic Venance, AFP
Windows Defender Dofil cybersecurity response
Windows Defender Dofil cybersecurity response
Microsoft
Untitled
Philippe HUGUEN, AFP/File
File photo: IBM Security instructors at the company’s security business headquarters  simulate cyb...
File photo: IBM Security instructors at the company’s security business headquarters, simulate cyber attacks in the world’s first commercial cyber range at the IBM X-Force Command Center in Cambridge, Mass.
MIT and IBM Watson AI Research Lab (CC BY-ND 2.0)
The tool s response to using  testpassword  as a password
The tool's response to using "testpassword" as a password
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
Samy Kamkar s $5 Raspberry Pi Zero-based  PoisonTap  hacking tool
Samy Kamkar's $5 Raspberry Pi Zero-based "PoisonTap" hacking tool
Samy Kamkar
Critics say the GDPR could take away an important tool used by law enforcement  security researchers...
Critics say the GDPR could take away an important tool used by law enforcement, security researchers, journalists and others.
Thomas Samson, AFP/File
Anything connected to the internet -- from smartphones to power plant controllers -- can be manipula...
Anything connected to the internet -- from smartphones to power plant controllers -- can be manipulated, a Dutch military cyber official said
ODD ANDERSEN, AFP/File
Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
PICTFOR
Air Force Cyber Command Center
Air Force Cyber Command Center
U.S. Air Force
Ryan Stolte  Co-founder and CTO of Bay Dynamics.
Ryan Stolte, Co-founder and CTO of Bay Dynamics.
Bay Dynamics
A hacker in action.
A hacker in action.
Davide Restivo (CC BY-SA 2.0)
Five models and three different generations of security token devices for online banking. The newer ...
Five models and three different generations of security token devices for online banking. The newer models are in the foreground.
M0tty

Latest News
Top News