Email
Password
Remember meForgot password?
    Log in with Twitter

Cybersecurity News

Collection #1 hack was bad enough, what about Collection #2-5? Special

Following the huge Collection #1 breach, there has been a new leak – dubbed Collection #2-5 – which has exposed 2.2 billion unique usernames and passwords. Experts from OneSpan provide insight into the implications for businesses and consumers.

Interview: Privacy ops connects security and privacy teams Special

According to the GDPR regulations enacted in 2018, all organizations that handle data on European customers must now retain a data protection officer (DPO). While this help, what’s needed is an expert in Privacy Operations.

Q&A: What’s in store for business technology this year? Special

The biggest technology trends ahead are expected to have an impact on security, including the adoption of cloud computing, plus advances in machine learning and artificial intelligence. Greg Young, from Trend Micro explains more.

What are the implications of the Collection #1 breach? Special

A massive trove of leaked data, which was recently posted to a hacking forum, includes some 772,904,991 unique email addresses and 21,222,975 unique passwords. Will LaSala from OneSpan weighs in.

Largest public data breach by volume revealed

The biggest ever data breach has been reported, in terms of the volume of data exposed. Dubbed 'Collection #1', the data loss extends to 772,904,991 unique emails and 21,222,975 unique passwords having been exposed.

Q&A: Fortune 500s are turning to academics for cybersecurity Special

Fortune 500 companies are fighting huge security and privacy hurdles by harnessing ‘super radical math’ developed by cryptography expert Professor Nigel Smart. The academic explains his approach and how it can help.

Q&A: The Future of encryption in a quantum-led world Special

The U.S. has prioritized research into quantum computing, in order to push forward advances in fields like medicine. However, the quantum world presents new risks for cybersecurity and encryption, according to Professor Shlomi Dolev.

New project to make cryptocurrency transfers more secure

A new project called Beam has been launched with the aim of improving cryptocurrency security and transparency. The project is centered around the word ‘confidentiality’.

U.S. government shutdown: Websites insecure and inaccessible

One underplayed aspects of the longest U.S. government shutdown in history is with federal websites. Several websites have become inaccessible and even more face security risks due to a lack of updates.

IT security-focused predictions for 2019

Consultants Trend Micro predict the biggest upcoming technology trends expected to have an impact on security. A special summary of these predictions have been provided to Digital Journal readers.

Hackers crack vein authentication security

Hackers have constricted a fake hand out of wax and used this to show the weaknesses in vein authentication software. The software, which scans the vein patterns in hands and compares them to stored images, is not as robust as security experts thought.

Business passwords remain vulnerable: Report

For many businesses password management is important. However, many businesses remain vulnerable to cyberattack due to weak password management systems, according to a new report.

Can quantum computing boost cybersecurity?

U.S. legislators have passed a bill which will permit the development and eventual use of quantum computing to boost cybersecurity measures within the country. The bill will release funds in order to accelerate development.

Op-Ed: A look back at the year of the Facebook scandals

Facebook has not had a good year, and least from the perspective of its users and the public at large. Crowning this was the involvement with Cambridge Analytica, but there have been other data privacy issues too.

Is Quantum cryptography ready for the Internet?

Viena - Quantum cryptographically is set to make data flow more secure. However, has remained something of an unrealizable goal, except for encrypted communication between two participants. However, there has now been a breakthrough.

Q&A: Remaining cyber safe when travelling over the Holiday season Special

Douglas Crawford, privacy expert at BestVPN.com, discusses what the Marriott cyber-hack means for the 367 million affected, and how consumers can take better steps in protecting themselves online.

Q&A: Why are we still at risk from email hacking? Special

No one is free from hacking, including world governments. In the technological age we live in how can this still happen? Furthermore, what measures are needed to protect businesses, governments and individuals. A leading expert weighs in.

Australia passes cyber snooping laws with global implications

Sydney - Australia Thursday passed controversial laws allowing spies and police to snoop on the encrypted communications of suspected terrorists and criminals, as experts warned the "unprecedented powers" had far-reaching implications for global cybersecurity.

Marriott data breach reminds travelers to be on guard Special

With Marriott International admitting that hackers stole about 500 million records from its Starwood Hotels reservation system, travelers need to be on their guard, according to Scott Grissom, Chief Product Officer, LegalShield.

Fix Facebook, whether it wants to or not: whistleblower

Apo - Eight months after revealing the links between Facebook and Cambridge Analytica (CA), whistleblower Christopher Wylie is pushing for the internet giant to be regulated -- whether it wants to or not.

Why time matters when dealing with cyber threats

IT professionals are engaged in a continuous arms race with threat actors. In relation to vulnerabilities, this arms race is between attackers' access to exploits and defenders' ability to assess, remediate and mitigate them.

BlackBerry bounces back as a cybersecurity consultancy

BlackBerry may still be associated with the first wave of smartphones, However the Canadian company has had more success recently with system security services and products.

Op-Ed: What exactly is the smart city?

The term 'smart city' is a buzz term used widely in the news, and one that’s increasingly moving from tech pages to news pages. But what is the smart city? Will it change your life? And what are the risks?

London's new digital accelerator hub

London - Keen to establish London as a global digital tech center, a new accelerator has been set up with backing from the U.K. government. Nine firms specializing in cybersecurity are the first cohorts.

Q&A: Cybersecurity solutions for data migration Special

As companies are undergoing digital transformation, many are inadvertently leaving themselves open to cyberattacks, according to Eitan Bremler, Co-Founder and VP of Product at Safe-T.

Making Canadian neighborhoods connected and safe

Toronto - OneEleven and Aviva Canada are coming together to host the event 'Safer Neighbourhoods Hackathon'. The aim is to help to ensure Canadian neighbourhoods are safer and better connected through technology.

Can smart cities become 'cybersecure' cities?

Toronto - Google’s Toronto smart city is an innovative project but it also brings with it various challenges, both technological and in terms of privacy and security. Trend Micro have looked at how smart cities can become cyber-secure cities.

Risk vulnerabilities with telepresence robots

Research from Zingbox has highlighted vulnerabilities with telepresence robots. These weaknesses can be leveraged by hackers to access sensitive data such as chat conversations, images and live video streams.

Q&A: Time to reform Canada's data privacy laws? Special

Do Canadians have “the right to be forgotten?” Canada’s privacy watchdog plans to ask the Federal Court for clarity and at the same time this is being challenged by Google. Expert Éloise Gratton weighs in.

Huazhu Hotels investigating potential loss of guest data

A leading Chinese hotel group - Huazhu Hotels - is investigating a serious leak of millions of guests' data. This follows millions of its customers' records appearing for sale on the Internet.
  1 2 3 4 5 6 ... 13 Next»

Set up a news alert for

Cybersecurity


Cybersecurity Image

CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
CIA hackers earn less than cybersecurity experts defending cloud services at private tech firmse
Pixabay / Pexels
The tool s response to using  testpassword  as a password
The tool's response to using "testpassword" as a password
Five models and three different generations of security token devices for online banking. The newer ...
Five models and three different generations of security token devices for online banking. The newer models are in the foreground.
M0tty
Gregg Garrett is the Head of International Cybersecurity with BDO USA  LLP  one of the nation’s le...
Gregg Garrett is the Head of International Cybersecurity with BDO USA, LLP, one of the nation’s leading professional services organizations.
BDO USA
MIT President  Dr. L Rafael Reif (on left) and IBM Senior Vice President  Cognitive Solutions and Re...
MIT President, Dr. L Rafael Reif (on left) and IBM Senior Vice President, Cognitive Solutions and Research, Dr. John Kelly III (on right), reach a 10-year, $240 million agreement to establish the MIT and IBM Watson AI Lab where fundamental joint research in AI hardware and software will be conducted to propel scientific breakthroughs that will unlock the potential of AI.
MIT and IBM Watson AI Research Lab
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
IBM Security instructors at the company’s security business headquarters  simulate cyber attacks i...
IBM Security instructors at the company’s security business headquarters, simulate cyber attacks in the world’s first commercial cyber range at the IBM X-Force Command Center in Cambridge, Mass.
MIT and IBM Watson AI Research Lab
Unsecured Tesla Kubernetes console
Unsecured Tesla Kubernetes console
RedLock
This strong password was created by typing several random letters  numbers and symbols on the keyboa...
This strong password was created by typing several random letters, numbers and symbols on the keyboard
cups.cs.cmu.edu
Ryan Stolte  Co-founder and CTO of Bay Dynamics.
Ryan Stolte, Co-founder and CTO of Bay Dynamics.
Bay Dynamics
Malicious subtitle files could compromise computers  security researchers warned today
Malicious subtitle files could compromise computers, security researchers warned today
Check Point Security
Untitled
By Dwight Burdette (Own work) [CC-BY-3.0 (http://creativecommons.org/licenses/by/3.0)], via Wikimedi
NATO has two rapid reaction teams on standby  armed with fast computers with vulnerability-analysis ...
NATO has two rapid reaction teams on standby, armed with fast computers with vulnerability-analysis code, forensic software and special database management tools 
DAMIEN MEYER, AFP/File
A sample of WordPress pages defaced by hacking group w4l3XzY3
A sample of WordPress pages defaced by hacking group w4l3XzY3
A hacker in action.
A hacker in action.
Davide Restivo (CC BY-SA 2.0)
Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
PICTFOR
No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
Windows Defender Dofil cybersecurity response
Windows Defender Dofil cybersecurity response
Microsoft
Samy Kamkar s $5 Raspberry Pi Zero-based  PoisonTap  hacking tool
Samy Kamkar's $5 Raspberry Pi Zero-based "PoisonTap" hacking tool
Samy Kamkar
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple

Latest News
Top News