CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Hacker working on laptop showing Russian hackers piggybacking on exploits of Iranian hackers
Cyber SecurityNews

Russian Hackers Now Piggybacking on Exploits of Iranian Hackers

October 31, 2019
New report reveals Russian hackers have been masquerading as Iranian hackers in order to access sensitive government, military and commercial secrets in 35 countries.
Read More
Man touching circuit brain hologram with business icons showing how AI can champion cybersecurity in the insurance industry
Cyber SecurityInsights

How AI Can Champion Cybersecurity in the Insurance Industry and Beyond

September 18, 2019
Cybersecurity is an ever-changing landscape with attackers constantly trying to develop new threats. See how companies are turning to AI to secure their sensitive data.
Read More
Screen shot of Qualcomm logo on the smarphone showing security vulnerability on Qualcomm chips affecting Android phones
Cyber SecurityNews

Security Vulnerability in Qualcomm Chips Affects Nearly 40 Percent of Smartphones; Compromises Flagship Android Phones

May 13, 2021
Check Point discovered another security vulnerability in Qualcomm chips affecting 40% of smartphones, allowing hackers to inject code in Android phones, including Google, Samsung, LG, Xiaomi, and One Plus brands.
Read More
Military soldiers training in military camp showing how civilian technology can have an impact like the Strava heat map incident
Cyber SecurityInsights

Strava Heat Map Incident: How Civilian Technology in Military Settings Needs to Be Controlled

August 29, 2018
As location-based services become ubiquitous and the rise of selfie soldiers, the Strava heat map incident shows the difficulty in governing civilian technology in military settings.
Read More
Hacker hand stealing data from laptop showing sale of data breach records on hacker forum
Cyber SecurityNews

Over 34 Million Records From 17 Companies Including Lazada and Eatigo Listed for Sale on Hacker Forum

November 17, 2020
A threat actor listed on a hacker forum data belonging to over 17 companies containing over 34 million records. Victims include Eatigo and Alibaba-owned Lazada's RedMart online grocery.
Read More
Flags of USA and China on two clenched fists showing the new draft China cybersecurity law which could block US tech firms from doing business
Cyber SecurityNews

New China Cybersecurity Law Could Block Tech Firms From the United States

June 12, 2019
A new draft China cybersecurity law could restrict certain U.S. companies from doing business in the country which clearly represent a tit-for-tat in the escalating trade and cyber war between U.S. and China.
Read More
Black Apple iPhone on a gray background showing iPhone security and app sideloading
Cyber SecurityNews

Apple Makes Case Against App Sideloading by Comparing iPhone Security to Android Malware Stats

October 21, 2021
Apple attributes iPhone security to its "walled garden" approach. Among other claims, Apple says that an Android device is up to 47 times more likely to contract malware and that allowing app sideloading would attract a wave of cyber crime to the iOS platform.
Read More
Businessman using tablet in car showing the Perswaysion phishing campaign that is targeting C-suite executives at international organizations
Cyber SecurityNews

Widespread “Perswaysion” Phishing Campaign Is Targeting the C-Suite of Hundreds of International Organizations

May 12, 2020
A new phishing campaign that chains exploits from Microsoft’s Sway, OneNote and Sharepoint services is targeting C-suite executives at a wide range of organizations worldwide.
Read More
Close up female hand using smartphone showing rise of mobile fraud
Cyber SecurityNews

Fraudsters Adopt Automation, Jailbreaking and Outdated Apps to Commit Mobile Fraud

June 29, 2020
New report from DataVisor reveals cybercriminals are increasingly targeting mobile channels to commit fraud, with 90% of mobile fraud originating from Android devices.
Read More
Hacker using laptop against binary code world map showing DDoS attack and data breach with leaked data on hacker forum
Cyber SecurityNews

3.7 Million FlexBooker Accounts Leaked to Hacker Forum After DDoS Attack

January 12, 2022
FlexBooker, a commonly used appointment scheduling and calendar service, is apologizing to its customers after 3.7 million records appeared on a dark web hacker forum following a DDoS attack.
Read More
1 … 137 138 139 140 141 … 157

Latest

Board members sits at a table in a meeting room showing personal liability

Personal Liability for Directors Who Disregard Cybersecurity

Police car with roof mounted strobe lightbar showing law enforcement data breach

Data Breach on DEA Law Enforcement System Grants Cyber Criminals Access to 16 Databases

VPN logo on smartphone lying on laptop showing VPN providers to hand over customer data

VPN Providers Ordered by Indian Government To Hold All Customer Data for Five Years, Hand Over to Government Upon Request

National Stadium and residential buildings with mountains in the background in San Jose, Costa Rica showing Conti ransomware

Could a Cyber Attack Overthrow a Government? Conti Ransomware Group Now Threatening To Topple Costa Rican Government if Ransom Not Paid

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results