The pharmacy would not say how many people had been affected by the error, but said that prescription data and customers’ names were part of the leaked information.
- By Haley Samsel
- Mar 04, 2020
Among the common types of cybersecurity attacks perpetrated on enterprises, arguably none are as sophisticated, effective or lucrative as ransomware is today.
- By Moshe Shlisel
- Mar 01, 2020
Development and deployment of container-based software has become a popular movement in technology.
- By Ambuj Kumar
- Mar 01, 2020
As security threats grow in complexity and scale, organizations are spending major resources to address the threats and minimize risk, including hiring top security talent and purchasing sevenfigure security solutions.
- By Marcus Carey
- Mar 01, 2020
As the cyber threat landscape has matured and evolved, cybersecurity incidents have become a regular occurrence.
Data on OTAs and prototypes. The House proposed an annual reporting requirement on how the Defense Department is using OTAs.
- By Lauren C. Williams
- Mar 01, 2020
CYBERCOM has created a Twitter account with thousands of followers to publicize malware samples it shares with cybersecurity companies. Internal documents explain that it’s part of a defensive (and offensive) strategy.
- By Haley Samsel
- Feb 27, 2020
The legislation reflects growing frustration from the Justice Department about the encryption practices of tech companies, particularly when it comes to investigating child abuse or terrorist activity.
- By Haley Samsel
- Feb 26, 2020
CCPA (officially called AB-375) incorporates some of the elements of GDPR and takes a broader view of private data and protecting PII. The storage, transportation, and management of sensitive consumer and company information have become critical issues for companies of all sizes to lock down and secure.
- By Richard Kanadjian
- Feb 24, 2020
The security company is making two-factor authentication mandatory and is considering allowing users to opt out of sharing their data with third-party companies.
- By Haley Samsel
- Feb 20, 2020
Through a “spearphishing link” sent to staff at the facility, hackers were able to deploy ransomware on the operational network, leading to a two-day shutdown.
- By Haley Samsel
- Feb 20, 2020
The new trend of public disclosures by government agencies about cybersecurity threats has led to the latest report about North Korea’s newly developed malware used to spy and steal data.
- By Haley Samsel
- Feb 19, 2020
Tech company Voatz is fighting back against research critical of its security protections, stating that researchers used an outdated version of the app and never examined Voatz servers.
- By Haley Samsel
- Feb 17, 2020
Less than half of cybersecurity professionals are prepared for cyber attacks on their own IoT devices, according to one study.
- By Katya Smith
- Feb 14, 2020
The amount of disinformation surrounding the coronavirus outbreak is the perfect environment for scammers preying on confusion.
- By Haley Samsel
- Feb 13, 2020
U.S. prosecutors say that four members of the People’s Liberation Army were involved in the hacking, which exposed the sensitive data of more than 147 million people.
- By Haley Samsel
- Feb 12, 2020
Ransomware attacks hit at least over 200,000 organizations last year, and the average ransom demanded rose dramatically at the end of 2019.
- By Haley Samsel
- Feb 11, 2020
Open-source software isn’t a completely chaotic and breached wasteland of vulnerabilities. It’s a global effort to make the development lifecycle faster.
- By Gilad David Maayan
- Feb 10, 2020
A cybersecurity firm conducted basic testing on the top 100 airports’ public websites and mobile apps. No U.S. airports passed it, and only three European airports did.
- By Haley Samsel
- Feb 06, 2020
McAfee’s survey of 13 states considered “critical” in the presidential election found that 83 percent lacked .GOV validation, which verifies websites as being run by official local governments.
- By Haley Samsel
- Feb 05, 2020