Security experts from VASCO, Spikes Security and STEALTHbits commented on the latest hack of health insurer excellus that may have…
Browsing: Breaches
The study of real-word events helps illustrates the different types of cyberattack and how to deflect them In series of case…
Microsoft is returning to court to challenge the US government’s demand that it hand over emails stored at an Irish…
Nearly two-third (63%) of infosec professionals falsely believe or don’t know that a Certificate Authority (CA) does not actually secure…
Solution Combines Protection of User Accounts, Web Applications and Enterprise Data In The Cloud and On-premises Imperva, Inc., (NYSE: IMPV),…
Allianz report highlights that cyber risks are evolving far beyond privacy or reputational issues. Global cyber insurance market forecast to…
Usually, these disclosure notices contain one, maybe two vulnerabilities on one product. Not so for this one; we’ve got ten…
What’s TVSPY? TVSPY is a malware that takes advantage of a vulnerability in Teamviewer software version 6, a legitimate tool…
A software vulnerability has been discovered in the web-based version of the popular WhatsApp messaging app for smartphones, which could…
Following the revelation that users of pornographic app ‘Adult Player’ are being subjected to ransomware attacks, security experts Raj Samani…