Kaspersky Lab has uncovered infrastructure used by the well-known Russian-speaking APT group Crouching Yeti, also known as Energetic Bear, which includes…
Browsing: Identity and Access Management (IAM)
Experts from SANS last night presented the five most dangerous new cyber attack techniques in their annual RSA keynote session in San Francisco, and…
WinMagic, a leading encryption solutions provider, today announced the launch of its latest software release, SecureDoc 8.2. Purpose-built for a…
It’s usually wrong to judge people by their names, but an organisation that calls itself “Snake” probably isn’t up to…
LocalBlox, a company that scrapes data from public web profiles, has left the details of over 48 million users on…
Identity fraud hit an all-time high, with almost 175,000 cases in 2017, according to a new report from Cifas that was released…
TaskRabbit, a web-based service that connects freelance handymen with clients in various local US markets, has emailed customers admitting it…
A new project from Cybereason, where the team created a fake company as a honeypot to trick the bots commonly…
The BBC today ran a story covering how cyber-attackers are now turning to tools that automate the process of finding and hijacking…
The report issued today by the House of Lords Committee, warns that the UK has what it takes to become…