Hacking & Cyberattacks

Fade to black: Is white-hat hacking education being banned?

White-hat hacking is an essential part of IT training, but it may be kneecapped by a movement to ban the…

1 month ago

The cybersecurity 80/20 rule: 5 steps that will repel most attacks

Not all cybersecurity risks are created equal. The cybersecurity 80/20 rule means prioritizing resources toward risks that could cause the…

1 month ago

7 of the worst small business cybersecurity mistakes

By avoiding these small business cybersecurity mistakes, you can strengthen your defenses, lower the risk of getting hacked, and safeguard…

2 months ago

Top cybersecurity threats for the rest of 2019 — and beyond

Cybercriminals are getting smarter, so you must get smarter, too. These latest cybersecurity threats are trending — and not in…

2 months ago

Business email compromise attacks on the rise: FinCEN

A new report by a U.S. agency shows business email compromise attacks are on the rise, with companies that conduct…

2 months ago

Why mission-critical encryption remains a must for IT security

Many processes, procedures, and technologies can be used to protect mission-critical enterprise data. None is as effective as mission-critical encryption.

2 months ago

Louisiana declares state of emergency after cyberattack

In the latest cyberattack against a government, Louisiana has been forced to declare a state of emergency after a cybersecurity…

2 months ago

Equifax to pay $671M to settle massive 2017 data breach mess

Equifax has agreed to a $671 million settlement deal to compensate customers who were victims of the company’s massive 2017…

2 months ago

Silex — a malware created by teens — bricks IoT devices

A new malware dubbed Silex renders IoT devices useless — and it wasn’t created by experienced hackers. It was unleashed…

3 months ago

OSX/Linker: New zero-day malware targets Mac devices

The cloak of invulnerability Mac users feel protects them from malware is torn again. OSX/Linker is a zero-day that attacks…

3 months ago