Email
Password
Remember meForgot password?
    Log in with Twitter

Cybersecurity News

Amazon and Wikipedia still giving poor password advice

Plymouth - A decade of research shows that little improvement has been made in the guidance given by leading websites in relation to security and for the protection of privacy data.

Q&A: Cybersecurity risks associated with the smart home Special

Cybersecurity expert Alex Vaystikh recently bought a new dishwasher before realizing that it connects to his Wi-fi to download updates. In an exclusive interview with Digital Journal, Vaystikh expands on smart home risks.

What is the average cost of a data breach?

IBM Security and Ponemon Institute released their study on the average cost of a data breach. In it they found that data breaches are only going up in cost, and in the volume of records stolen.

AI has the potential to reduce cyberattacks: Interview Special

As data becomes more pervasive and more accessible, cybersecurity and privacy concerns continue to be on the rise as well. Can AI can continue to advance without risking highly personal and valuable information? Dan Baird of Wrench.AI shares his views.

AT&T to acquire threat intelligence company AlienVault

Yesterday telecommunications giant AT&T made a move to bolster security for businesses by announcing its intention to acquire California-based cyberthreat response company Alien Vault.

Insider threats are inherent to every organization

All businesses are at risk from cyberattacks. While much attention is focused externally, a considerable risk exists internally, as new report from LogRhythm indicates.

Cybercriminals are exploiting machine-to-machine communications

Businesses are ever more reliant upon machines, and the range of physical devices on enterprise networks is significant. While this is key to efficiencies it opens up new areas for cyberattack.

Reviewing the impact of the VPNFilter malware attack

A novel VPNFilter malware has affected 500,000 networking devices globally. Marina Kidron, Director of Threat Intelligence in the Skybox Research Lab looks at what is know so far.

Q&A: Why businesses still face cyber risks Special

Vertek Research recently uncovered a leak that exposed over 43 million email addresses to a massive spamming campaign. Why are businesses still vulnerable to this type of attack and what can be done to protect them?

NHS data breach affects 150,000 patients

London - An NHS data breach has affected 150,000 patients in England, according to the British government. The NHS is blaming a coding error. Data was shared for clinical audits and research on the patients who had opted out of any data information sharing.

Q&A: Are IoT devices a security threat? Special

Connected devices are a potential ongoing threat to the security of their users. The main concerns are discussed by IoT security expert Yotam Gutman, who outlines steps that can be followed to avoid becoming a victim of IoT hackers of all types.

Cybersecurity company raises $120 million in latest funding round

Cylance, a provider of cybersecurity-related products and services that markets themselves as being able to prevent attacks years before the attack is even launched, raised $120 million in their Series E funding round.

Cyber thieves claim they have hit two large Canadian banks

Montreal - Bank of Montreal and Canadian Imperial Bank of Commerce said on Monday that cyber attackers may have stolen the data of nearly 90,000 customers in what appeared to be the first significant assault on financial institutions in the country.

RSA 2018 reveals the top five security themes

San Fransisco - The information technology and security community are bombarded with cyberattacks, and also regulations and a quantity of solutions that are difficult to decipher. The recent RSA conference revealed some solutions.

Twitter bug is a reminder that your data is vulnerable

This morning Twitter users opened their accounts to find a prompt asking them to change their password because of a bug in the system. Twitter Inc. is definitely not the only company to have a data protection incident this year, here are a few others.

New International Standard for information security

A revised standard for information security has been issued. This follows the changing landscape in relation to cybersecurity issues and the growing complexity of technology, which brings with it new vulnerabilities.

Russia blocks Telegram app over security concerns

Moscow - Russia has announced plans to block the use of the social media app Telegram over security concerns. This stems from the developers refusing to supply the encryption keys used to scramble messages.

Managing cybersecurity in the age of artificial intelligence

Regardless of if it's computational propaganda, or fake news and videos, or private data leaks, artificial intelligence has increasingly become a real global security challenge.

State of play: One year on from WannaCry ransomware outbreak

The one year anniversary of the WannaCry ransomware outbreak, which severely impacted global healthcare organizations, edges closer. A new report assess how well hospitals and healthcare facilities have respond in terms of new technology and systems.

How to stop cyberattacks on GPS-enabled devices

San Antonio - Technologists have devised a new technique designed to prevent cyberattacks on GPS-enabled devices. GPS, especially for utilities, remains one of the higher risk technologies in terms of cybersecurity.

IoT expansion could pose greater utilities threat

According to a new assessment, the adoption of Internet of Things technology raises the prospect of new and more imaginative cybersecurity threats, especially for utilities companies.

Cybersecurity skills lacking in the legal sector

According to a new assessment, while legal services are embracing new technologies the legal profession is lacking the necessary skills to ensure good cybersecurity practices are in place. Greater investment in resources is also required.

Were Blackberrys modified to help drug cartels?

Toronto - It appears that some Blackberry devices were modified to 'help drug cartels', according to U.S. authorities. The allegation is that Canadian company Phantom Secure sold modified Blackberry devices for illicit reasons.

Intel details plans for Meltdown and Spectre hardware protections

Intel has announced that its upcoming silicon architectures will include hardware fixes for the Meltdown and Spectre chip vulnerabilities. The company has redesigned parts of its processors to add "protective walls" between apps and malicious actors.

Google claims Android security 'leads the industry'

Google has published its fourth Android Security Review in which it details its progress in protecting ecosystem. The company is trying to address the perception that Android is less secure than iOS, claiming the two platforms now have security parity.

Prilex malware clones chip-and-pin payment cards

Cybercriminals have developed an effective way to clone chip-and-pin cards, according to research from Kaspersky Lab. The Prilex campaign has been active for over three years and is designed to subvert the latest protections introduced by card companies.

Microsoft patches 'critical' flaw in Windows' Remote Desktop

Microsoft has issued a preliminary fix for a serious vulnerability in Windows' Remote Desktop Protocol (RDP). An attacker could leverage the flaw to steal authentication details from a remote desktop session and gain control of a network domain.

Microsoft expands Windows Meltdown and Spectre patch availability

Microsoft has announced it is expanding its Meltdown and Spectre patches to a wider range of Windows PCs. In this month's Patch Tuesday security updates, the company delivered Intel's microcode updates to computers which were previously unprotected.

Slingshot malware campaign hid inside routers for six years

Security researchers have discovered a "highly sophisticated" malware which has been targeting Wi-Fi routers for over six years. It's thought Slingshot is the product of a state-sponsored cyberespionage campaign.

Cyberattacks using Microsoft PowerShell soar by over 400%

Microsoft's PowerShell scripting engine is becoming the target of choice for attackers looking to sneak exploits onto Windows systems. Research conducted by McAfee found the use of "fileless" hacking, using scripts instead of programs, is rapidly growing.
  1 2 3 4 5 6 ... 12 Next»

Set up a news alert for

Cybersecurity


Cybersecurity Image

Gregg Garrett is the Head of International Cybersecurity with BDO USA  LLP  one of the nation’s le...
Gregg Garrett is the Head of International Cybersecurity with BDO USA, LLP, one of the nation’s leading professional services organizations.
BDO USA
Untitled
By Dwight Burdette (Own work) [CC-BY-3.0 (http://creativecommons.org/licenses/by/3.0)], via Wikimedi
Critics say the GDPR could take away an important tool used by law enforcement  security researchers...
Critics say the GDPR could take away an important tool used by law enforcement, security researchers, journalists and others.
Thomas Samson, AFP/File
Samy Kamkar s $5 Raspberry Pi Zero-based  PoisonTap  hacking tool
Samy Kamkar's $5 Raspberry Pi Zero-based "PoisonTap" hacking tool
Samy Kamkar
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
Pixabay / Pexels
Five models and three different generations of security token devices for online banking. The newer ...
Five models and three different generations of security token devices for online banking. The newer models are in the foreground.
M0tty
A hacker in action.
A hacker in action.
Davide Restivo (CC BY-SA 2.0)
A sample of WordPress pages defaced by hacking group w4l3XzY3
A sample of WordPress pages defaced by hacking group w4l3XzY3
Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
PICTFOR
IBM Security instructors at the company’s security business headquarters  simulate cyber attacks i...
IBM Security instructors at the company’s security business headquarters, simulate cyber attacks in the world’s first commercial cyber range at the IBM X-Force Command Center in Cambridge, Mass.
MIT and IBM Watson AI Research Lab
MIT President  Dr. L Rafael Reif (on left) and IBM Senior Vice President  Cognitive Solutions and Re...
MIT President, Dr. L Rafael Reif (on left) and IBM Senior Vice President, Cognitive Solutions and Research, Dr. John Kelly III (on right), reach a 10-year, $240 million agreement to establish the MIT and IBM Watson AI Lab where fundamental joint research in AI hardware and software will be conducted to propel scientific breakthroughs that will unlock the potential of AI.
MIT and IBM Watson AI Research Lab
Unsecured Tesla Kubernetes console
Unsecured Tesla Kubernetes console
RedLock
Untitled
Loic Venance, AFP
This strong password was created by typing several random letters  numbers and symbols on the keyboa...
This strong password was created by typing several random letters, numbers and symbols on the keyboard
cups.cs.cmu.edu
Malicious subtitle files could compromise computers  security researchers warned today
Malicious subtitle files could compromise computers, security researchers warned today
Check Point Security
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
Ryan Stolte  Co-founder and CTO of Bay Dynamics.
Ryan Stolte, Co-founder and CTO of Bay Dynamics.
Bay Dynamics
No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
The tool s response to using  testpassword  as a password
The tool's response to using "testpassword" as a password
Windows Defender Dofil cybersecurity response
Windows Defender Dofil cybersecurity response
Microsoft