Over the past decade, the firms that make up the so-called Big Tech have captured enough of the global economy to resemble industrial cartels from a bygone era. Amazon, Apple, Google, Facebook, and Microsoft form behemoths within their respective marke…Read More Big Tech will try to pre-empt harsh privacy laws by writing their own
During the past year, business leaders have seen first-hand the benefits of adopting an everywhere enterprise model of working and are now carefully considering its role in the future of work. A study by Mercer revealed 94% of employers agreed that pro…Read More Protecting productivity within the disappearing perimeter
The number of annual credential spill incidents nearly doubled from 2016 to 2020, according to F5 research. There was a 46% downturn in the number of spilled credentials during the same period. The average spill size also declined, falling from 63 mill…Read More Credential spill incidents nearly doubled since 2016
Thanks to cyberattacks making regular headlines in the news, it’s no secret that massive data breaches are a significant threat to organizations. However, a report from F-Secure highlights the rarely-discussed impact these attacks can have on people an…Read More People are often the collateral damage of attacks on corporations
Ransomware is a special type of malware. Once it infected your computer, it encrypts all of your files and demands you pay a ransome if you want your files back. Be suspicious of any emails trying to trick you into opening infected attachments or cli…Read More Ransomware
Spirent Communications released its 5G outlook report, based on analysis and takeaways from over 600 global 5G engagements in 2020. The report provides insights from across the 5G eco-system on the current status of 5G, illustrating the accelerated tim…Read More 5G experimentation and security grows in govt, military sectors
Organizations are overwhelmed by the choice of cyber security tools in the market. They need to balance prioritizing and remediating vulnerabilities with managing their secure configurations. What’s more, many organizations are using hybrid clouds wher…Read More Using Strategic Choices to Ensure Continuous and Effective Cyber Security
Guardicore released IPCDump, a new open source tool for tracing interprocess communication on Linux. The tool covers most interprocess communication (IPC) mechanisms, including pipes, fifos, signals, Unix sockets, loopback-based networking, and pseudot…Read More IPCDump: Open-source tool for tracing interprocess communication on Linux
Sentropy announced its first consumer product – and third product overall – Sentropy Protect, which enables Twitter users to proactively identify and protect themselves from abusive Twitter accounts. Built upon its world-class abuse detection technolog…Read More Sentropy Protect helps tackle online hate and harassment from abusive Twitter accounts
Sonrai Security announced significant new functionality designed to automate prevention of data breaches in public cloud deployments for its Sonrai Dig platform. Supporting leading public cloud databases in combination with advanced behavioral modeling…Read More Sonrai Dig offers automated prevention of data breaches in public cloud deployments
Flaw leaves millions of IT, OT, and IoT devices vulnerable to attack.Read More High-Severity Vulnerabilities Discovered in Multiple Embedded TCP/IP Stacks
SIEM, we need to talk! Albert Einstein once said, “We cannot solve our problems with the same thinking we used when we created them”. Security vendors have spent the last two decades providing more of the same orchestration, detection, and response capabilities, while promising different results. And as the old adage goes, doing the same thing over and over again whilst […]Read More XDR – Please Explain?
Microsoft is releasing new versions of Windows 10 on a set schedule – and just as regularly retiring older versions from support. Here are all the dates you need to know about.Read More Windows 10 update (and retirement) calendar: Mark these dates
Stories about computer security tend to go viral when they bridge the vast divide between geeks and luddites, and this week’s news about a hacker who tried to poison a Florida town’s water supply was understandably front-page material. But for security nerds who’ve been warning about this sort of thing for ages, the most surprising aspect of the incident seems to be that we learned about it at all.Read More What’s most interesting about the Florida water system hack? That we heard about it at all.
Most enterprise IT groups were set up to manage devices that, for the most part, were located inside company walls. Yes, support also had to extend to traveling users with the occasional problems ‒ but that was the exception, not the rule. Today, wi…Read More BrandPost: Partnering for Success in the New Normal: Why IT Needs Help Protecting Remote Devices
Analysts who anticipate the SASE market will expand by more than a factor of five before 2025 explain reasons behind the surge.Read More SASE Surge: Why the Market Is Poised to Grow
SAP released seven new security notes on February 2021 Security Patch Day, including a Hot News note for a critical issue affecting SAP Commerce. SAP released seven new security notes on February 2021 Security Patch Day and updated six previously released notes. The new security notes include a Hot News note that addresses a critical vulnerability, tracked as CVE-2021-21477, […]
The post SAP addresses a critical flaw in SAP Commerce Product appeared first on Security Affairs.Read More SAP addresses a critical flaw in SAP Commerce Product
The critical SAP cybersecurity flaw could allow for the compromise of an application used by e-commerce businesses.Read More SAP Commerce Critical Security Bug Allows RCE
The ransomware gang behind the hack of CD Projekt Red may be asking for $1 million opening bids for the company’s valuable data.Read More Hacker Sets Alleged Auction for Witcher 3 Source Code
The company expects to launch its first satellite in two years.
The post Telesat contracts Thales Alenia Space to build satellite broadband first appeared on IT World Canada.
Patch early, patch often. In fact, patch now if you haven’t already. Here’s why.Read More Patch now to stop hackers blindly crashing your Windows computers
Speaking at Technicity West, a digital conference that brought together some of the brightest technology leaders in Western Canada on February 9, 2021, Mayor Nenshi reminded his audience just how quickly COVID-19 overturned our world.
The post Calgary …
Cloud network security firm iboss has appointed former BlackBerry chief product architect Eric Cornelius as its chief product officer.
The post Former BlackBerry exec joins network security firm iboss first appeared on IT World Canada.
Tenable enters into $98m definitive agreement to acquire Activity Directory security startupRead More Tenable Announces Intent to Acquire Alsid
Antivirus firm Emsisoft discloses a data breach, a third-party had access to a publicly exposed database containing technical logs. The anti-malware solutions provider Emsisoft disclosed last week a data breach. The company revealed that a third-party had accessed a publicly exposed database containing technical logs. The root cause of the incident was a misconfiguration of […]
The post Anti-malware firm Emsisoft accidentally exposes internal DB appeared first on Security Affairs.Read More Anti-malware firm Emsisoft accidentally exposes internal DB
Researchers at Google and Stanford analyzed a 1.2 billion malicious emails to find out what makes users likely to get attacked. 2FA wasn’t a big factor.Read More Hybrid, Older Users Most-Targeted by Gmail Attackers
This month’s relatively humble bundle of security updates fixes 56 vulnerabilities, including a zero-day bug and 11 flaws rated as critical
The post Microsoft patches actively exploited Windows kernel flaw appeared first on WeLiveSecurity
If you work from home, you’re probably busier than ever these days. These 10 Mac tips should help you get more done faster.How to combine files into a PDF with Preview
So, you’ve got two or more different PDF documents and you want to combine them a…
Speaking at Technicity West, Surrey Mayor McCallum stressed the importance of Surrey’s commitment to citizen experience, technology adoption, and partnerships – especially during a global pandemic.
The post Prepared to pivot – tips from Surrey, B.C. fi…
Those who are committed to adopting the concept have the opportunity to make a larger business case for it across the organization, working with executive leaders to implement a zero-trust framework across the entire enterprise.Read More Zero Trust in the Real World
In light of the current pandemic, our healthcare industry has been challenged like never before. Healthcare workers heroically stepped up to the plate, caring for those in need, while the industry itself digitally transformed to keep up with the influx…Read More 75% of Apps in the Healthcare Industry Have a Security Vulnerability
21 of the 24 dating apps examined were tagged with the “*Privacy Not Included” warning label.Read More Mozilla privacy report on dating apps singles out Grindr for serious security lapses
Edmonton is using data to determine how much greenhouse gas it avoids emitting by having staff work remotely every day.
The post Taking advantage of data in a changing economy: Edmonton, Alberta first appeared on IT World Canada.
Need to get up to speed on the latest features in Excel? Wrestling with an old version of Word? Looking to get more out of Windows 10? Computerworld’s cheat sheets are easy-to-use guides to help you navigate Microsoft’s core productivity apps.Here’s…Read More Microsoft cheat sheets: Dive into Windows and Office apps
Addressing a virtual audience at Technicity West, Winnipeg Mayor Bowman highlighted some of the city’s projects around the use of open data
The post Harnessing open data and IoT keys for growth, says Winnipeg mayor first appeared on IT World Canada.
Malware designed to steal log-in information saved in browsers has infected 16 million computers and swiped credentials for up to 174,800 accounts.Read More NordVPN puts the price tag of stolen streaming subscriptions at $38 million
Valentine’s Day is nearly upon us – and as couples and singletons alike gear up for a day that’s traditionally all about sharing, when it comes to our digital identities, might we be sharing too much, and how can we protect ourselves? With data showing that past, present and possibly even future lovers are willing […]
The post Why it’s Best to Stick to Sharing Chocolates and Flowers this Valentine’s Day appeared first on McAfee Blogs.Read More Why it’s Best to Stick to Sharing Chocolates and Flowers this Valentine’s Day
Malicious Valentine’s Day-themed phishing campaigns are up 29% from last year, according to Check Point Research.Read More Love is in the air—and cybercriminals are taking advantage
In mid-October, Microsoft announced the availability of Windows 10 version 20H2, known as the October 2020 Update. But the launch of a major Windows 10 update isn’t the end of a process — it’s really just the beginning. As soon as one of Microsoft’s…Read More Windows 10: A guide to the updates
Microsoft never sleeps. In addition to its steady releases of major and minor updates to the current version of Windows 10, the company frequently rolls out public preview builds to members of its Windows Insider Program, allowing them to test out —…Read More Windows 10 Insider Previews: A guide to the builds
The gaming firm CD Projekt Red, which developed popular games like Cyberpunk 2077 and The Witcher, has disclosed a ransomware attack. The gaming firm CD Projekt Red, which developed popular games like Cyberpunk 2077 and The Witcher series, has suffered a ransomware attack. The company confirmed the security breach with a series of messages on […]
The post CD Projekt Red game maker discloses ransomware attack appeared first on Security Affairs.Read More CD Projekt Red game maker discloses ransomware attack
Novel supply chain attack allows researcher to hack internal systems of major companiesRead More Researcher Hacks Apple and Microsoft
Office 365 and Microsoft 365 subscribers always have the latest version of Microsoft Office — currently Office 2019. They also get more frequent software updates than those who have purchased Office 2019 without a subscription, which means subscribe…Read More Office 365: A guide to the updates
New Yorker stole intimate images from social media accounts and traded themRead More Hacker Admits Stealing College Girls’ Nude Snaps
Intel is warning on security bugs across its graphics drivers, server boards, compute modules and modems.Read More Intel Squashes High-Severity Graphics Driver Flaws
When she’s not perfecting her lock-picking skills, Angel Grant is busy building a diverse team who have the right attributes for the dynamic world of technology. In this edition of our podcast series, Angel explains that since your …
As a Google-identified attack reveals, security teams need to look beyond VPNs and network infrastructure to the channels where social engineering takes place.Read More Multivector Attacks Demand Security Controls at the Messaging Level
Microsoft has recently released the patched vulnerabilities roll which includes 56 system and operating system vulnerabilities and security updates for Windows 10. The complete patching list includes over 1000 items, 300 of them having been flagged as …Read More Patch Tuesday (February 2021): Microsoft Patches 56 Windows Vulnerabilities, including a Window Zero-Day Vulnerability
In a corporate context, an asset is part and parcel of a company’s financial worth. Assets hold economic value and future benefits, as they have the ability to generate cash flow. For this reason, IT asset management, or ITAM for short, is quintessenti…Read More Everything You Need to Know About IT Asset Management
The Code42 2021 Data Exposure Report highlights the need to adopt a new approach to data security and invest in modern Insider Risk technology.Read More The time for Insider Risk Management is now: Code42 2021 Data Exposure Report Reveals a Perfect Storm
Analyzing cryptocurrency data, a research group has estimated a lower-bound on 2020 ransomware revenue: $350 million, four times more than in 2019.
Based on the company’s data, among last year’s top earners, there were groups like Ryuk, Maz…
Today’s podcast reports on a global phishing service shut by police in Ukraine, fake proof of virus vaccination cards offered for sale, a video game developer hit by ransomware and the latest Microsoft security updates
The post Cyber Security Today – P…
Apple has rolled out a fix for a critical sudo vulnerability in macOS Big Sur, Catalina, and Mojave that could allow unauthenticated local users to gain root-level privileges on the system.
“A local attacker may be able to elevate their privileges,” Ap…
In what’s a novel supply chain attack, a security researcher managed to breach over 35 major companies’ internal systems, including that of Microsoft, Apple, PayPal, Shopify, Netflix, Yelp, Tesla, and Uber, and achieve remote code execution.
2020 has initiated a sea change into the way organisations of all shapes and sizes approaches business. The new normal is here to stay for a while even after the pandemic subsides and remote and anywhere operations will remain the new norm for companies across the world. To meet the new needs of remote consumers […]
The post Safeguard your Business: Top Resolutions to Help Enhance your Cybersecurity appeared first on CyberDB.Read More Safeguard your Business: Top Resolutions to Help Enhance your Cybersecurity
A previously known Windows remote access Trojan (RAT) with credential-stealing capabilities has now expanded its scope to set its sights on users of Android devices to further the attacker’s espionage motives.
“The developers of LodaRAT have added Andr…
Understanding is the first step to combating Phishing: Types, Methodology & Prevention Tips According to the 2019 Data Breach Investigations Report (DBIR) by Verizon, phishing is the leading cause of data breaches. The data also shows us that phishing is also widely utilized for cyber espionage with more than three-quarters of all known incidents involving […]
The post Understanding is the first step to combating Phishing: Types, Methodology & Prevention Tips appeared first on CyberDB.Read More Understanding is the first step to combating Phishing: Types, Methodology & Prevention Tips
A new breach analysis from CI Security found that cybercriminals are going after medical billing and insurance companies.Read More 177% increase: Hackers grabbed 21.3 million healthcare records in the second half of 2020
While it’s logical to assume seniors would be primary targets, a new report revealed that millennials were actually the most targeted demographic group of the more than 50 billion spam calls made in 2020.Read More Hit block caller: 75% of Americans were targeted by scammers
Need to create and share a presentation? If so, you probably turn to the most popular presentation application in the world, Microsoft PowerPoint for Windows.Microsoft sells Office under two models: Individuals and businesses can pay for the softwar…Read More PowerPoint for Microsoft 365 cheat sheet
This download accompanies our story PowerPoint for Microsoft 365 cheat sheet. See that article for detailed information on how to get the most out of PowerPoint for Microsoft 365/Office 365 in Windows.To read this article in full, please click here(Ins…Read More PowerPoint for Microsoft 365 cheat sheet: Ribbon quick reference
Facebook toughens up on COVID-19 false claims, the digital currency Dogecoin is skyrocketing, and we take a look at an AI that shows which ads motivated people to buy products.
The post Hashtag Trending – Facebook expands false claims policy; Dogecoin …
Adobe released security patches for 50 flaws affecting six products, including a zero-day flaw in Reader that has been exploited in the wild. Adobe has released security updates that address 50 vulnerabilities affecting its Adobe Acrobat, Magento, Photoshop, Animate, Illustrator, and Dreamweaver products. Adobe fixed 23 CVEs in Adobe Reader, 17 of which have been rated […]
The post Adobe fixes a buffer overflow issue in Reader which is exploited in the wild appeared first on Security Affairs.Read More Adobe fixes a buffer overflow issue in Reader which is exploited in the wild