The average person in the world today keeps a ton of “stuff” on their smartphone. Gone are the days when making a call was the only thing you could do—now there’s basically nothing you can’t do on your mobile device—aside from keeping it completely safe, that is. Emailing, banking, shopping, it’s all right there at
A new study by cybersecurity firm Rapid 7, recently revealed that their penetration testers have successfully exploited at least one software vulnerability used by about 84% of all the companies included in the study. The test was done in early September 2017 through mid-June 2018 and involved a total number 268 companies. A software vulnerability is any
In a recent intelligence report, the U.S. Department of Homeland Security has revealed serious weaknesses in Gmail’s new interface, many of which appear to be highly exploitable. As a top email service released in April 2004, Gmail has become the de-facto mode of digital communication for many people, especially those using an Android mobile device.
Of all the digital threats organizations are facing today, nothing beats the worst of the worst, otherwise known as human error. Data theft, information leaks, virus infections, spear phishing, spam, identity theft, corporate espionage, and the latest, cryptojacking infections are now all working together to compromise the systems and steal the data of online businesses.
As part of the world’s biggest public network, the darknet is not for the faint-of-heart and should be treated as a highly volatile digital environment. Not only is it not accessible through a regular browser and mainstream internet connection—it contains vulnerabilities we haven’t even begun to image. It is not hidden because of secrecy, but
The recent implementation of GDPR and the race for increased corporate compliance with issues of privacy has generated a lot of noise in the cybersecurity industry, most of which stems from a lack of overall understanding about the new measures—and what they mean for the future of online business. An article recently published by Motherboard suggests
When it comes to keeping business running smoothly, corporate board-of-directors need to be proactive, especially nowadays. This includes supporting the infrastructure that handles the organization’s digital data, storage, and utilization. Not long ago, a company’s Chief Technology Officer (CTO) or Chief Information Officer (CIO) was the central authority in IT decisions; however, that role has
Recent reports claimed that Rakhni, a ransomware strain, has developed a new coinminer component that allows it to sneak into the funds of Bitcoin users. Rakhni is said to have the ability to lurk around a targeted computer before inflicting an attack. It then can either infect a computer right after sneaking in or run
Remote access may give employees the ability to access work-related data without being physically present, but it also puts them at risk of losing it all. Because anyone will have the power to access the organizational network when remote access is enabled, it becomes a potential target for cyber crimes that can compromise the network
Businesses of all sizes have been investing in security software and fundamental cybersecurity infrastructure for decades. The antivirus industry has grown into a huge industry on its own from its humble beginnings of just being a small utility a user can optionally be bought and came with a floppy disk media. In fact, the very