
Data of about 500 million Starwood clients may have been compromised in a breach that might have happened since 2014, according to the advisory posted by Marriott International. The investigation revealed that […]
Data of about 500 million Starwood clients may have been compromised in a breach that might have happened since 2014, according to the advisory posted by Marriott International. The investigation revealed that […]
Given Taiwan’s unique strengths and technological advantages over its Asia-Pacific counterparts, the cybersecurity industry could potentially harness the significant economic opportunity arising from the growing demand for cybersecurity, not only at the national level but also at the regional level.
Having claimed to be hacked on the eve of the presidential elections in 2017, French President Emmanuel Macron announced the “Paris Call for Trust and Security in Cyberspace,” which aims to create […]
IT security leaders in businesses across the globe are stuck with their hands behind their backs when it comes to fighting off cybercrime. They lack influence in the boardroom and find it […]
Security firm Trend Micro was able to detect what it calls an “in-the-wild sample” in Virus Total that delivers a malware that steals information. This is in response to Cymulate’s discovery of […]
Cybersecurity company Symantec Corp announced innovations and expansions to its cloud security portfolio, designed to help organizations protect the cloud generation applications and infrastructure they rely on. Symantec’s Cyber Defense Platform offers […]
Many cybersecurity specialists have made it their mission to not only spot the threats but also to ensure that customers are well-positioned to dodge the attacks. Halim Santoso, System Engineering (SE) director […]
Effective cybersecurity should be about striking a balance between human and machines. Where computers cannot, humans make sense of the data by ensuring machine-suggested actions have business value too.
Formjacking is the use of malicious JavaScript code to steal credit card information as well as other data entered in the payment form of e-commerce and other service-oriented websites.
The report says 92 percent of companies have cloud credentials for sale on the Dark Web
Names, addresses, birthdays, ID, passport numbers, and even travel history are just some of the personal details hackers were able to gain access to when the Cathay Pacific Airways Ltd. was compromised. […]
Acer Security Suite is a complete hardware and software package that encrypts any program file, computer, and user-set passwords and can leverage the trusted platform module technology for secure computing.
Network and endpoint security firm Sophos announced that it has added Endpoint Detection and Response (EDR) to its Intercept X endpoint protection portfolio.
Image from IDC Worldwide spending on security-related hardware, software, and services is forecast to reach $133.7 billion in 2022, according to the new update to the Worldwide Semiannual Security Spending Guide from […]
Image from Pixabay Cybersecurity company Symantec Corp. announced new enhancements to its Data Loss Prevention (DLP) technology to protect information in Office 365. With Symantec DLP, data is protected whether at rest […]
Image from Pixabay In the McAfee Threats Report for September 2018, security researchers highlight the surge of crypto mining malware that started last year and continued in the first half of this […]
Horangi Cyber Security announced that Alex Tran has been appointed vice president of marketing. In his new role, Alex will help Horangi expand its reach into new markets and product pipeline with […]
(Image by Pete Linforth/Pixabay) The average DDoS (distributed denial of service) attack quintupled in size to more than 26 Gbps and the maximum attack size quadrupled to 359 Gbps compared to the […]
(Image from Pixabay) The Kaspersky Lab Global Research and Analysis Team (GReAT) has discovered several infections from a previously unknown Trojan, which is most likely related to the infamous Chinese-speaking threat actor […]
(Image Pixabay) Cloud computing, even with the endless list of its advantages, tops the list of emerging risks in the industry, according to the survey conducted by IT (information and technology) research […]
(Image from Pixabay) Cybersecurity and defense company Trend Micro discovered recently a spam campaign that targets emails that are connected with banks. The malware downloader is disguised as a file extension most […]
(Image from Pixabay) Cybercriminals won’t discriminate on the size of an organization as long as they could obtain data and other information they could use for their crimes. Small and medium enterprises […]
(Image from Pixabay) Device-to-cloud cybersecurity company McAfee announced recently results from its latest survey, The Age of Consent, and found 30 percent of parents post a photo or video of their child […]
In a Gartner report published in July, it says that only 65 percent of organizations have cybersecurity experts in spite of the increasing number of high-profile data breaches worldwide. With cybercrimes on […]
In its recent article, Cybersecurity of the Philippines-CERT (CSP-CERT) illustrates how sextortion scams happen with victims often left helpless and opt to just give in to the criminal’s demand. In CSP-CERT’s explanation, […]
(Image from Pixabay) Instagram (IG) is one of the most popular social networking sites today with one billion monthly users. With the sheer number of accounts, it has become a playground for […]
(Image by Pete Linforth/Pixabay) Worldwide spending on information security products and services will reach more than $114 billion in 2018, an increase of 12.4 percent from last year, according to the latest […]
(Image from Pixabay) A security researcher MalwareHunterTeam discovered a new variant of Matrix Ransomware that can rename encrypted files, according to the report by BleepingComputer. Computers running Remote Desktop Services (RDP) and […]
In the second quarter of 2018, Kaspersky Lab’s anti-phishing technologies prevented over 107 million attempts to visit phishing pages, of which 35.7 percent were related to financial services and targeting customers through […]
(Image by Bethany Drouin/Pixabay) Cloud computing ranks as the top risk concern for executives in risk, audit, finance and compliance, according to the latest survey by Gartner Inc. While cloud computing presents […]
You must be logged in to post a comment.