A new strain of the ever-persistent Mirai botnet has begun to focus on TVs, digital signage and projectors according to…
Browsing: Identity and Access Management (IAM)
Seventy-two percent believe nation-states have right to ‘hack back’ cybercriminals Venafi®, the leading provider of machine identity protection, today announced the results…
Hacking has always been a problem for businesses and governments around the world. They have tried to upset the balance…
Cybercriminals are leveraging Internet Message Access Protocol (IMAP) for password-spray attacks to compromise cloud-based accounts according to Proofpoint. Justin Jett,…
News broke that Gearbest, a Chinese online shopping giant, exposed 1.5 million records on an Elasticsearch server that was not protected with…
Digital inclusion is the ability of individuals to access and use information and communication technologies (ICT). Even in today’s hyper-connected…
A new Ransomware-as-a-Service called Yatron is being promoted on Twitter that plans on using the EternalBlue and DoublePulsar exploits to spread to other computers on a…
The debate on the subject of self-half images hosted on Instagram seems to have got lost in translation by the…
The Dutch Data Protection Authority says that cookie walls that force consumers to accept tracking cookies is not compliant with…
Dozens of companies inadvertently leaking sensitive corporate and customer data because of misconfiguration of their Box enterprise storage accounts. The…