Hacking & Cyberattacks

Yet another dating site suffers data breach

Manhunt is just the latest in a long line of dating sites getting hacked and suffering a data breach. Is…

2 weeks ago

Tips for determining cybersecurity project priority

If you are a cybersecurity professional, you’ve almost certainly at some point felt overwhelmed by the sheer number of security…

2 weeks ago

Telegram targeted by new remote access Trojan ToxicEye

Messaging app Telegram has seen a large increase in users — and a large increase in cyberattacks — including a…

3 weeks ago

Confuse your attackers: Benefits of using a cyber-deception strategy

As organizations grapple with the ever-growing threat of sophisticated cyberattacks, IT security executives are considering cyber-deception strategies.

3 weeks ago

University of Hertfordshire experiences cyberattack

The University of Hertfordshire is trying to get back to normal after a systemwide cyberattack. Read on to see how…

3 weeks ago

Crucial cybersecurity expenses not getting the budget they deserve

While the more obvious cybersecurity expenses are crucial, it is important that you do not lose sight of the not-so-obvious…

4 weeks ago

The dangers of offensive cybersecurity

Offensive cybersecurity can stop cyberattacks before they impair target systems or penetrate defenses. But beware of the unintended consequences.

1 month ago

Health-services provider SalusCare sues Amazon over security response

Health-services provider SalusCare claims Amazon did not act in good faith during a cybersecurity incident. A court will decide whether…

1 month ago

Understanding the weakest link principle of IT security

Enterprise IT security comprises different parts that must work in concert. Overall security is only as good as the weakest…

2 months ago

Infrastructure cyberattacks: A major concern for IT security executives

The recent rash of cyberattacks on critical infrastructure has left IT security executives with deep worries. These concerns are valid.…

2 months ago