Zoom faces lawsuits accusing the company of covering up serious privacy and security issues as they onboard millions of new users due to the coronavirus crisis.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Newly discovered a TikTok vulnerability that allows hackers to show fake videos by executing man-in-the-middle (MitM) attacks, making it easy for hackers to promote scams, misinformation, or hate.
New White House phishing scam impersonating President Trump and Vice President Pence is baiting people who are anxious and lacking good guidance from the officials.
What will a cyberwar look like? Find out why you should not think about preparing for the next cyberwar but rather you should be preparing for many.
In a recent BGP hijacking incident, internet traffic meant for 200 major networks, content delivery networks and cloud providers were redirected through Russian state-owned telecommunications provider, Rostelecom.
Chinese hackers are on a massive cyber espionage campaign targeting over 75 organizations throughout the world and using vulnerabilities in various routers and cloud services.
New cybersecurity technologies will help companies better handle a cyber attack but they need to use more efficient methods to evaluate solutions that meet their security and regulation needs.
FBI is issuing more cyber security alerts than usual, covering human trafficking, COVID-19 scams, vulnerabilities in networking platforms and cloud-based business email compromise campaigns.
Marriott suffered its second large data breach through two employees’ login credentials that exposed personal information of 5.2 million guests from their customer loyalty accounts.
Remote working is rapidly increasing in current pandemic situation but every remote connection creates a new access point that hackers can exploit. What can you do to fully minimize the risks?