Non-malware attacks are on the rise. According to a study by the Ponemon Institute, 29 percent of the attacks organizations faced in 2017 were fileless. And in 2018, this number may increase up to 35 percent. So, what are non-malware attacks, how do they differ from traditional threats, why are they so dangerous, and what […]
Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.
Ever since the Spectre and Meltdown vulnerabilities were made public in January 2018, it seems like there’s been a more critical eye tracking Microsoft’s patch releases. These updates are typically pushed on the second Tuesday of every month, consisting of fixes for vulnerabilities discovered over the previous 30 days. That is, unless there’s a serious […]
Ensuring cybersecurity of your business becomes a bigger challenge every year. Cybercriminals perform new attacks, exploit new vulnerabilities, and perform new attacks on a constant basis while regulatory institutions change and improve standards. Your task is to be fully prepared to face these challenges. So today, we gathered the top 10 cybersecurity hot topics you’d […]
June’s Patch Tuesday (June 12, 2018) arrived, and if you haven’t applied the update yet, you may want to be extra cautious of where you leave your laptop. Cedric Cochin, a Cyber Security Architect at McAfee Labs reported a code execution vulnerability (CVE-2018-8140) on Windows 10 machines that could allow a hacker access to a […]
Cyber warfare can be used for all kinds of purposes, not just the hacking of rival nation-states or political parties’ emails. Businesses and financial institutions are all fair game. To protect digital assets, which include proprietary information and sensitive personnel data, employers need to double down in this age of hacking and set up systems […]
According to numerous recent studies the market for internet-connected security devices is increasing and will continue to do so in the near future. There has been an increase in overseas companies, particularly in China, that are manufacturing inexpensive security products such as cameras to meet the growing consumer and business demand. These cost-effective devices are […]
Information sharing is a big part of—and logically supports—incorporating cybersecurity into other critical infrastructure risks. It makes sense to put all risk mitigation practices into one comprehensive program.
Semiconductor manufacturer Advanced Micro Devices (AMD) has spent much of its history chasing its well-established competitor Intel, which was seen as making a superior product. While a great deal of virtual ink has been spilled in this debate over the years, at least on the personal computing side, it was as close to indisputable as […]
It is a story we’ve heard many times in the first 6 months of 2018: An independent researcher finds a critical vulnerability in the code of a popular app or website that leaks personally identifiable information. They reach out to a tech journalist or colleague to investigate. Once confirmed, the researcher or journalist reaches out […]
It’s been a very big year for discussing the privacy rights of technology users, with the ongoing coverage of Facebook, Cambridge Analytica, and the never-ending cycle of corporate data breaches. While the European Union’s General Data Protection Regulation (GDPR) was well ahead of the curve, it seems that one privacy advocate group timed a proposed […]