Read full post Strong authentication use overall remains weak but is starting to gain some ground with enterprises.
Read full post Looking at your mobile device while crossing is going to cost you
Read full post The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions?...
Read full post A long-term strategy focused on training and educating the next generation will help to ensure enough people have the right skills for the future. The post The Cybersecurity Skills Gap: Educating the next generation appeared first on...
Read full post Google turns its attention to your unencrypted DNS
Read full post Inmarsat says security firm’s narrative about vulnerabilities in its AmosConnect 8 shipboard email service is overblown.
Read full post Businesses are moving more sensitive data to the cloud but struggle to monitor and manage it once it’s there.
Read full post Telegram, Discord, Whatsapp grow in popularity as criminals look for more alternatives to fly under the radar.
Read full post Google plans to clean up Dodge, and it’s brought it’s wallet
Read full post For the first time since the Edward Snowden surveillance revelations, lawmakers get to choose a new law.
Read full post The U.S. electrical grid is in “imminent danger” from cyberattacks according to a report from the U.S. Energy Department released earlier this year. Such an attack would put much of the infrastructure that we rely on for...
Read full post If you think all you need is technology to defend against bad guys, you shouldn’t be a CISO. But technology is all cryptocurrency is, starting with Bitcoin.
Read full post As data from critical applications proliferates, customers are looking for deep visibility across the storage network, Cisco says.
Read full post The AmosConnect communication shipboard platform is so weak, complete hijacking is easy — and there’s an open door, too.
Read full post Traditional signature-based antivirus solutions are falling short on protecting endpoints, even when there are two or more deployed.
Read full post The router is the first device that you must consider, since it not only controls the perimeter of your network, but all your traffic and information pass through it. The post How to secure your router to...
Read full post In our previous blog entries we covered Simple Steps to Online Safety and Cybersecurity in the Workplace. In the blog today we will be talking about some of today’s predictions when it comes to the internet of...
Read full post Advances in analytics technologies promise to make identity management smarter and more transparent to users. But the process is neither straightforward nor easy. Here’s why.
Read full post An Illinois man is charged with hacking into more than 550 accounts that belong to entertainment industry figures and others.
Read full post Operational outcomes from infected endpoints are more common than data loss or financial effects, researchers found.
Read full post The Equifax breach shows how large companies can stumble when it comes to patching. Organizational problems can prevent best practices from being enforced.
Read full post Nudity will always get people’s attention.
Read full post Canadian small and medium businesses (SMBs) use a multitude of skills and resources to continuously improve all aspects of their companies’ performance. The post Canadian SMBs: How technology can help you stay energized appeared first on WeLiveSecurity
Read full post Apparently, a pirate download of Microsoft Office could be the root of all the trouble.
Read full post Researchers are exploring ways to use your smartphone’s camera as a secure way to identify yourself.
Read full post While serious, the bug would take advanced skills to exploit in a very small time window.
Read full post Yet another lesson in how not to secure your network.
Read full post Concerns over handling classified US data one of the reasons why Kaspersky Lab CEO ordered file deletion, company says.
Read full post Attack employs new version of infamous NotPetya ransomware used in June attacks on Ukraine targets.