The hack revealed unencrypted transmission of audio and/or video footage to the Ring application allows for arbitrary surveillance and injection of counterfeit...
On November 9th, 2018, Dell detected and stopped unauthorized activity on their networks.
The Cybersecurity and Infrastructure Security Agency is a brand new government law enforcement agency signed into law by President Trump.
In 2018, 51% of organizations had a cybersecurity skills shortage, up from just 21% in 2014.
Everything you invest in to improve your company’s cybersecurity practices should pay off down the line.
Eliminating bad-actors and data breaches is never going to happen, but you can stay a step ahead of them.
The personal information of 57 million users was accessed such as names, email addresses, and mobile phone numbers.
Whole Foods is the second retailer this week hit by a cybersecurity breach.
Regular consumers are easier targets and have fewer resources than major companies in combating criminals and ransomware demands.
The team responsible for Cyber Security Europe have decided to bring the same sort of event to the McCormick Place convention center.
Here you'll learn some cool facts about cyber-crime and the truth about some of the myths that cybercriminals would love you to...
The bad actors, whom Reuters calls "illicit software distributors," include TutuApp, Panda Helper, AppValley, and TweakBox.
Managed services prioritise a safe online life for everyone in the company, and also build data management protocols that optimise both security...
Senator Ron Wyden isn't only pitching jail time but also billions of dollars in fines on companies and executives who enable privacy...
Businesses of all sizes just need to be proactive in adopting and implementing these tools before their workplace is flooded with internet-connected...
Cybersecurity is ever-changing, requiring professionals to learn new loopholes and tactics to better protect the clients and companies they serve.
If you're not familiar with the dark web, well, let's just say it's probably better that you stay away from such things.
Researchers from Amnesty International published a report that highlights recent phishing operation that is hacking accounts in the Middle East and Africa.
Having a weak passcode is risky enough, but brazenly flaunting poor password practices in a room full of TV cameras is as...
The U.S. believes the companies are being used by the Chinese government for intelligence gathering on governments and non-Chinese citizens.
Phishing victims usually receive emails that look like messages from legitimate online vendors, such as Amazon and eBay.
"Facebook has access to the personal information of billions of people; a relative gold mine to threat actors and consumers alike."
There is nothing inherently threatening about IoT, but the security dangers continue to linger.
A spokesperson from T-Mobile told Motherboard that about 3% of customers were affected.
Business Email Compromise and Email Account Compromise are sophisticated scams with which hackers usually target the C-suite.
While TCM Bank was able to fix the situation the day after they discovered it, it still went undetected for months.
Even the earliest stories about this breach, as they broke, were clear that the scope of the incident was vast.
With no industry safe, it’s more important than ever to have a comprehensive prevention plan in place.