CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Image of Manila skyline representing the Philippines National Privacy Commission on the Comeleak data breach
Cyber SecurityNews

‘Comeleak’ Allows Philippine National Privacy Commission to Show Teeth

January 25, 2017
Privacy issues in the Philippines have become headline news as 2017 gets underway. In January, the National Privacy Commission (NPC) in that country issued a statement placing the blame for a data breach that put the personal information of millions of voters at risk squarely at the feet of the Commission on Elections (COMELEC) and its Chairman Andres Bautista.
Read More
Phone with Netflix app logo and mask on table showing the increase in scam websites mimicking online streaming services
Cyber SecurityNews

‘Dramatic Rise’ in Scam Websites Mimicking Online Streaming Services

May 4, 2020
700 scam websites pretending to offer online streaming services are taking advantage of the recent pandemic lockdowns to steal personal data and credit card information.
Read More
Microsoft logo at building showing alleged data breach of Microsoft accounts
Cyber SecurityNews

“Anonymous Sudan” Offering 30 Million Microsoft Accounts For Sale, Redmond Denies Data Breach

July 11, 2023
In addition to the DDoS campaign and claimed theft of Microsoft accounts, Anonymous Sudan has busied itself with a campaign of attacks against European banks as of late. Microsoft says there is no evidence of a data breach.
Read More
Russian military vehicles on the city street showing hacker collective Anonymous waging cyber war
Cyber SecurityNews

“Anonymous” Hacker Collective Declares Cyber War Against Russian Government Over Ukraine Invasion

March 3, 2022
The present incarnation of the hacker collective opened up its cyber war against Russia by temporarily taking down a number of government websites, including those of the Kremlin and the Defense Ministry.
Read More
Police’s evidence boxes showing the data dump of police files from hundreds of U.S. law enforcement agencies
Cyber SecurityNews

“BlueLeaks” Data Dump Contains Police Files of Hundreds of Law Enforcement Agencies, Tied Back to a Third-Party Services Provider

July 6, 2020
Data dump containing 269 GB of police files from hundreds of U.S. law enforcement agencies and the FBI is found to be tied to a breach at a shared third-party vendor.
Read More
Toy robot in front of a monitor showing the security concerns over the chrome extensions used by checkout bots to snap up delivery time slots.
Cyber SecurityNews

“Checkout Bots” Use Chrome Extensions to Automatically Snap up Delivery Time Slots, But Are They Safe?

May 19, 2020
Checkout bots are gaining popularity in coronavirus pandemic to snap up delivery time slots through Chrome extensions including those that may contain security vulnerabilities.
Read More
Merck company logo on website page showing NotPetya attack and cyber war
Cyber SecurityNews

“Cyber War” Exception Struck Down in Merck’s Battle With Insurance Company Over NotPetya Attack

February 3, 2022
Recent ruling in New Jersey involving the NotPetya attacks indicates that insurers may not be able to use "cyber war" clauses as an excuse to not pay out for remediation of ransomware attacks.
Read More
Drums of slot machine showing cybersecurity issue at MGM
Cyber SecurityNews

“Cybersecurity Issue” at MGM Brings Vegas Strip Properties to a Standstill

September 14, 2023
MGM, one of the two largest casino-hotel chains on the Strip, has not yet confirmed the nature of the attack, calling it a 'cybersecurity issue.' The properties remain open, but operations such as front desk check-ins and payouts for casino games have had to shift to entirely manual operations.
Read More
Man typing on keyboard with virtual search engine showing ransomware gangs data leak site allow search for stolen data
Cyber SecurityNews

“Innovations” Continue for Ransomware Gangs as Specific Stolen Data Becomes Searchable on Data Leak Sites

July 26, 2022
Since June, some ransomware gangs have begun incorporating search functions into their data leak sites, making stolen data more accessible to put added pressure on victims.
Read More
Hacker with cellphone showing threat of "juice jacking" at public USB charging stations
Cyber SecurityNews

“Juice Jacking” at Public USB Charging Stations? Los Angeles County DA’s Office Issues Warning, but How Real Is the Threat?

November 28, 2019
While there is no evidence at present of a rash of "juice jacking attacks on public USB charging stations, or even any novel exploits of this nature, appropriate precautions should still be taken.
Read More
1 2 3 … 243

Latest

Man in dark hoodie touching virtual lock showing third-party data breach

Dollar Tree Third-Party Data Breach Exposes Sensitive Data of Nearly 2 Million Employees

Hacker working at night showing hacker groups infiltrated nuclear site

Senior Staff at Sellafield Nuclear Site Accused of Covering up Breaches by Hacker Groups Dating Back to at Least 2015

Scales of justice and judge's gavel on wooden table showing data privacy laws

Crossing the Aisle on Data Privacy Laws: Explaining the Disconnect Between What People Want and What Lawmakers Pass

Finger on laptop keyboard showing Iranian hackers target water utilities

Iranian Hackers Strike US Water Utilities in Retaliation for Israel Support

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations EU GDPR Facebook
    See all results