The UK’s cybersecurity agency also outlines precautions that academia should take to mitigate risks
The humongous collection of extensive personal details about millions of people could be a gold mine for scam artists
An introduction to the MITRE ATT&CK framework and how it can help organize and classify various types of threats and adversarial behaviors.
Does true Artificial Intelligence even exist yet? Will it ever exist or will it end the world before we reach its full capacity?
The legal action, brought over alleged click injection fraud, is said to be among the first of its kind
The compromised company may bear the financial brunt of the breach within the first year after the incident occurs, but the price tag is still far from final
A trifecta of issues impact the organization’s cyber-resilience and conspire to put it in the firing line of cyberattacks
“Sounds bad”, the former Equifax CIO wrote in a text after learning of the breach that ended up affecting almost half the US population
The new feature is intended to protect the kind of data that you hold particularly dear
Why smaller businesses cannot afford to ignore how they gather, store and protect data
How a Montreal-made "social search engine" application has managed to become widely-spread adware, while escaping consequences
Add that to the US$1.4 billion that the massive security incident two years ago has cost the company so far
The ESET survey of thousands of people in Asia-Pacific (APAC) provides valuable insight into their perceptions of cyber-threats and various common aspects of online security
You think you’re watching the games for free, but are you sure that's the case? Let’s review some of the risks that may come with free live streaming websites
What are some of the most interesting takeaways from Verizon’s latest annual security report?
How approaching cybersecurity with creativity in mind can lead to better protection from digital threats
How can smaller businesses address their cybersecurity risks without the resources of large organizations?
Our penchant for plugging in random memory sticks isn’t the only trouble with our USB hygiene, a study shows
Every year on March 8, we celebrate International Women's Day to honor the social, economic, cultural and political achievements of women. But we also acknowledge that there is still a long way to go before we’ve truly reached gender parity. This day gives us the opportunity to reflect on how we can achieve that balance. So it’s particularly fitting that the theme of this year’s International Women’s Day is “Balance for Better”
The organization was the victim of a watering hole attack, likely attributable to the APT LuckyMouse group