A former Yahoo engineer has confessed to breaking into as many as 6,000 email accounts belonging to Yahoo users. Once…
Browsing: Identity and access management (IAM)
Many cybersecurity professionals mistakenly believe virtual desktop infrastructure (VDI) is an effective way to combat cybercriminals, or at minimum slow…
Arkose Labs · Over half of all logins (53%) on social media sites are fraudulent and 25% of all new…
Hagai Katz, head of Government Sector at Check Point explores how nation states can and should prevent cyberattacks against their…
In the earlier article “Secrity, Democracy And Digital Identity” , we made clear that we should look for ‘something other than the…
In the initial years of the public cloud, security was cited as the primary reason not to upload sensitive data…
Hackers are currently exploiting an unpatched vulnerability in the Rich Reviews WordPress plugin for malvertising campaigns. Although the plugin was…
Iran’s government-backed hackers are trying to infect US military veterans with malware with the help of a malicious website, researchers…
It has been reported that a mysterious state-sponsored hacking group has targeted at least 17 US utility firms with phishing emails…
Sibos has kicked off in London this week and the theme for this year is “Thriving in a hyper-connected world.”…