Saturday, July 11, 2020
IBM Security

Overcoming Data Security Challenges in a Hybrid, Multicloud World

Cloud computing is evolving at a rapid pace. Today, there’s a range of choices for moving applications and data to cloud that includes various deployment models from public and private to hybrid cloud service types. Organizations are seeking ways to...
IBM Security

Updating Legacy Systems Amid Growing Cybersecurity Concerns

Over the past few months, a shift to remote working has raised many security questions for businesses trying to protect their data. And, ensuring that legacy systems are secure is a key priority.  Keeping legacy systems up to date in...
IBM Security

Future-Proofing Data With a Data Encryption Plan

Data volume storage needs are growing exponentially across hybrid multicloud environments. Meanwhile, companies are being faced with a greater number of regulations to follow, as well as increased exposure to data ransomware, theft and misuse. Many regulations, such as the General Data...
IBM Security

Video Conferencing Security Tips You May Have Overlooked

Video conferencing applications grew substantially following the outbreak of the coronavirus (COVID-19) global pandemic. According to Research and Markets article “Video Conferencing Demand Rises due to Social-Distancing,” video conferencing software experienced 62 million downloads in March 2020. This increase...
IBM Security

COVID-19 Cybercrime Capitalizing on Brazil’s Government Assistance Program

IBM X-Force Incident Response and Intelligence Services (IRIS) has been tracking cybercrime capitalizing on the coronavirus pandemic since January, and has observed the geographical areas of this activity shift over time. In February, cybercriminals were focusing on Asia, and...
IBM Security

Fix Shadow IT In Your Organization

Shadow IT can be potentially harmful to a company’s security protection, because it exists outside a company’s typical software and service approval and audit workflows. Shadow IT refers to information technology projects, applications and software used and managed outside...
IBM Security

Why Zero-Click Cyberthreats Should Be on Your Radar

For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost inevitable from happening. We’ve been convinced that the key...
IBM Security

How Growing Businesses Should Tackle Cybersecurity Challenges

When we think about the most public cyber attacks and data breaches, we generally associate them with large enterprises. The truth is cyber attacks are not limited by company size. A significant cyber attack can happen to any company,...
IBM Security

The Modern Workplace: Keeping Remote Workers Productive and Secure

Results from the March 30, 2020, Gartner CFO Survey indicate that 74% of businesses intend to shift some employees to permanent remote work following their initial experience responding to current global conditions. Regardless of recent world events, many workers already...
IBM Security

The 2020 Cyber Resilient Organization: Preparation and Technology Differentiate High Performers

The Ponemon Institute just released its annual “The Cyber Resilient Organization” report, sponsored by IBM Security. In its fifth year, this study takes an in-depth look at organizations’ ability to prevent, detect, contain and respond to cyberattacks. The report...
IBM Security

These Cybersecurity Trends Could Get a Boost in 2020

The events of early 2020 have prompted organizations to shift priorities across the board, and security processes are no exception. While the current working environment has presented numerous short-term challenges, it has also caused security leaders to take a...
IBM Security

The Security Risks of Contactless Payment

Contactless payment first arrived in the 1990s and is now having its moment. Both companies and consumers are looking for ways to conduct business with as little physical interaction as possible during in-person transactions. We’ve been building to this moment,...
IBM Security

Vulnerable Powerline Extenders Underline Lax IoT Security

Multiple vulnerabilities have been found in Tenda PA6 Wi-Fi Powerline extender, version 1.0.1.21. This device is part of Tenda’s PH5 Powerline Extender Kit and extends the wireless network through home’s existing electrical circuitry. The kit, in collaboration with X-Force...
IBM Security

Three Approaches to Cybersecurity Planning for Post-Pandemic Cloud Adoption

The global pandemic has been dictating how the whole world is reforming, businesses included. Different forums and analyst reports are increasingly calling out the future of businesses as they are moving their workloads to the cloud gradually. IDC “expects...
IBM Security

Visibility and Threat Detection in a Remote Working World

At the outset of the COVID-19 pandemic, when governments around the world put stay-at-home orders in place, it was hard to imagine the state of work would permanently change. Yet, as organizations rapidly adopted and expanded systems to enable...

Windows 10 Security Game-Changer As Microsoft Reveals New Hacker Protection

Microsoft is set to bring a powerful new security feature to Windows 10 that just might be a game-changer.

15 Billion Stolen Logins Are Circulating on the Dark Web

Plus: Facebook's Roger Stone takedown, the BlueLeaks server seizure, and more of the week's top security news.
The Hacker News

Exclusive: Any Chingari App (Indian TikTok Clone) Account Can Be Hacked Easily

Following vulnerability disclosure in the Mitron app, another viral TikTok clone in India has now been found vulnerable to a critical but easy-to-exploit authentication bypass vulnerability, allowing anyone to hijack any user account and tamper with their information, content,...

Is TikTok Seriously Dangerous—Do You Need To Delete It?

Here's the reality behind all the headlines...

iPhone User Sues LinkedIn For Reading Clipboard Data After iOS 14 Alert Revelations

The fallout from Apple's new iOS 14 privacy notification feature continues as one iPhone user files a class-action lawsuit against LinkedIn for silently reading clipboard data.