Proposed new features and app concepts are reportedly being nixed solely because of fears they will violate Apple’s privacy rules. Examples include scrapped plan to allow voice purchases via Siri.
Two new cyber attack attempts, one in the San Francisco Bay Area and another in Pennsylvania, will keep water supply security in the news. But sensational media headlines may also be stoking an unnecessary level of fear among the general public.
Cybereason recently exposed a multi-year cyber espionage operation carried out by Chinese hackers where they follow their targets moving from country to country by hopping from one breached network to another.
Slack debuted its long-awaited direct messaging feature but within just a few days it was gone, pulled due to a technical oversight that created major security concerns.
There is an increasing overlap of cyber and physical security breaches, crime and espionage. Cybercriminals slip between the gaps of those tasked with physical, information and cyber security, as they often do not coordinate their activities and see their realms as completely separate.
DHS is now requesting that the U.S. Congress grant it extraordinary administrative subpoena powers so that it can request ISPs to turn over the contact information for the owners of industrial control systems.
An attack on SAP systems can have a devastating impact on business operations, greatly affecting finances and reputation. Here are four ways to increase SAP security
Ransomware groups have shifted from the automated, ‘spray and pray’ tactics of yesterday to highly targeted, human-operated ransomware attacks, carefully crafted to find and encrypt your data and cause maximum critical service disruption.
Three US government agencies issue a joint alert over Taidoor malware attack in Chinese cyber espionage campaigns targeting governments and organizations.
Attackers are combining DDoS attacks and "click fraud" in new email extortion scams that target publishers with websites monetized through Google AdSense program.