Arizona Beverages was recently hit with a massive ransomware attack – yet the company has taken nearly two weeks to…
Browsing: Identity and Access Management (IAM)
Millions of Facebook recordswere found to be publicly exposed on an Amazon cloud server, showing that companies haven’t done enough…
Canadian police last week raided the residence of a Toronto software developer responsible for authoring and selling “Orcus RAT,” a…
Biometric fingerprint technology is no longer a novelty. In fact, today’s banks and card issuers are looking to integrate fingerprint…
It has been reported that Automattic, the company behind the WordPress.com blogging platform, said it fixed a bug in its official iOS application…
It has been reported that a database breach at Georgia Tech has exposed the personal information of up to 1.3 million current and former faculty…
The vxCrypter Ransomware could be the first ransomware infection that not only encrypts a victim’s data, but also tidy’s up their computer by…
Software used to harvest potentially sensitive information about users is widespread across the websites of government departments and local authorities,…
Thycotic’s 2019 State of Privileged Access Management Maturity Report Reveals Alarming Shortcomings in PAM Security Practices Thycotic, a provider of privileged access management…
Email verification company Verifications.io leaked Email addresses of almost one billion people. Last week it was estimated as 700 million but number of…