Saturday, July 11, 2020

Adding A New Layer Of Security To The Global Internet

As internet traffic continues to surge, Adam Davenport, director of interconnection strategy at GTT, explores the steps that must be taken to better protect consumers and businesses against route leaks and hijacks. Throughout the COVID-19 pandemic, more and more...

The Fundamentals Of COVID-19 Risk Assessment

Like most during the coronavirus pandemic, and the resulting COVID-19 infections, I like the majority of responsible people have been applying the rules, and taking care to do my bit to mitigate the travelling viral conditions for the sake...

How Mobile Tech Can Ease The COVID-19 Burden On Retail And Logistics

There isn’t a single industry that remains unaffected by COVID-19. The closure of non-essential shops on the 26th of March, coupled with strict social distancing measures to slow the spread of the virus, has naturally caused a surge in online purchases...

AI Adoption – Data Governance Must Take Precedence

Imagine this, if you will. You’ve just bought a new car, it’s the latest model with all the frills. All of these extras make parking a doddle, your emissions reduced and your journeys smoother. You use your car nearly...

Cybersecurity 101 For SMBs And SOHOs

Cybersecurity is one of the most widely discussed topics in the world of technology today. Despite security solutions being constantly developed and improved, small businesses (SMBs) and home office workers (SOHOs) remain largely unprepared for a potential data breach...

Security From Home: Protecting A Self-isolated Workforce

The global coronavirus pandemic has proven to be the biggest test of how modern and flexible working practices are enabling employees to stay productive, working anytime, anywhere, on any device. Today’s enterprise mobility technologies enable employees to remotely connect...

Keeping Your Cloud-based Office Safe And Secure

It goes without saying that the outbreak of COVID-19 has posed significant challenges to our workplace productivity. Replacing face-to-face meetings with video calls, getting access to files saved on one central server and finding the best spot in the...

How To Counter Phishing Vulnerabilities When Returning To Work

While organisations have endeavoured to adapt to the huge changes brought on by the coronavirus pandemic, there has been an increase in cyber attackers looking to exploit the situation for their own gain. These were the findings of a...

Is Your Remote Working Model Compliant?

With data collected by the Office for National Statistics (ONS) indicating that almost 50 per cent of Great Britain’s workforce was working from home in mid-April, and with many organisations looking to consider permanent remote working models as the lockdown eases, the need...

How Credential Stuffing Is Evolving

Credential stuffing sounds simple: attackers test stolen usernames and passwords across sites to see what works. After the hype and complexity of vulnerabilities like Heartbleed and Spectre, password reuse seems easy to dismiss. This has caused credential stuffing to...

Breaking Down AI’s Role In Cybersecurity

Data security is now more vital than ever.  Today’s cybersecurity threats are incredibly smart and sophisticated. Security experts face a daily battle to identify and assess new risks, identify possible mitigation measures and decide what to do about the...

Astronomer To Cyber Wizardry

It was in 1989 when Clifford Stoll first published The Cuckoos Egg, and in my opinion this is not only the best ever book written on the subject of Cyber (then IT) crime, but is also a must read...

Redacting PDFs – A Simple Task With Lots Of Consequences

In 2019, lawyers representing the former political advisor Paul Manafort filed a response to special counsel Robert Mueller’s claims that Manafort violated his cooperation agreement by repeatedly lying to prosecutors. Specific sections of this response were redacted before it...

The Evolving Global Privacy Framework

There are few certainties in 2020 given the global geo-political, social and economic landscape. What in January looked like an already complicated year changed immeasurably as Covid-19 spread around the globe. The global response by nation states to the...

The “Mobius Strip” Of Cyber Security

Over the last few years, cyber criminals have become more agile and possess a higher quality of skill than ever before. However, these skills come at a cost to industries worldwide. According to the Allianz Risk Barometer 2020, companies...

Windows 10 Security Game-Changer As Microsoft Reveals New Hacker Protection

Microsoft is set to bring a powerful new security feature to Windows 10 that just might be a game-changer.

15 Billion Stolen Logins Are Circulating on the Dark Web

Plus: Facebook's Roger Stone takedown, the BlueLeaks server seizure, and more of the week's top security news.
The Hacker News

Exclusive: Any Chingari App (Indian TikTok Clone) Account Can Be Hacked Easily

Following vulnerability disclosure in the Mitron app, another viral TikTok clone in India has now been found vulnerable to a critical but easy-to-exploit authentication bypass vulnerability, allowing anyone to hijack any user account and tamper with their information, content,...

Is TikTok Seriously Dangerous—Do You Need To Delete It?

Here's the reality behind all the headlines...

iPhone User Sues LinkedIn For Reading Clipboard Data After iOS 14 Alert Revelations

The fallout from Apple's new iOS 14 privacy notification feature continues as one iPhone user files a class-action lawsuit against LinkedIn for silently reading clipboard data.