David Emm, Senior Security Researcher at Kaspersky Lab, discusses the recently disclosed Moonpig vulnerability.
Browsing: Malware and Vulnerabilities
Thorsten Trapp, Co-Founder and CTO at Tyntec, predicts that the adoption of SMS-based 2FA will see a significant surge in 2015.
Ilia Kolochenko, CEO of High-Tech Bridge, makes some cyber security predictions.
DDoS attacks are commonly utilised as a distraction for a much larger and more damaging attempt at data exfiltration or breach.
ESET Ireland researchers have compiled a summary of the most important cybercrime trends we can expect in 2015.
Ponemon’s latest research quantifies a point that we’ve all come to understand: the cost of data breaches is increasing for organizations of all sizes.
The Internet Systems Consortium, better known as ISC, thinks it might have had a malware infection.
Carmine Clementelli, Security Expert and Manager at PFU, a Fujitsu Company, investigates the Sony hack and wonders if it was an inside job.
The PCI Security Council has announced new guidance addressing compliance practices they call “Business As Usual (BAU).”
As we approach the new year, here are eight areas of IT security for you to consider to avoid becoming the next data breach news story.