As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, but…Read More Researchers design a way to make encrypted keys harder to crack
Datadobi released a report by 451 Research which reveals the major impact that data growth is having on storage management, highlighting the rise in retention of unstructured data exacerbating the storage challenges faced by organizations. The report u…Read More Data growth as the number one storage management challenge
If your network gets infected with ransomware, follow the steps below to recover essential data: Step 1: Do not pay the ransom because there is no guarantee that the ransomware creators will give you access to your data. Step 2: Find any available back…Read More Here Are the Free Ransomware Decryption Tools You Need to Use [2021 Updated]
Considering the breadth and diversity of attacks facing today’s organizations, it’s no wonder cybersercurity and IT professionals are relying on an ever expanding arsenal of new tools and technologies. A recent survey revealed that nearly 80% of organi…Read More Product Showcase: Acronis Cyber Protect
68% of Americans plan to travel for leisure this summer, with 12% doing so internationally, a McAfee survey reveals. While 68% of U.S. consumers report that they are connected to more devices and digital activity since the start of the pandemic, roughl…Read More Consumers aware of travel cyber risks, still not putting their digital wellness first
Asset and security control management provider Panaseer on Wednesday announced a new $26.5 million round of funding, bringing the total investment in the company up to $43 million.
Amidst the pandemic overwhelming the capacity of many hospital systems, malicious hackers have been quick to target healthcare providers and medical agencies. These cyber-attacks have hit both the United States and Europe in recent months, serving as a…Read More Cybersecurity and Compliance for Healthcare Organizations
94.7% of IT leaders saw an impact to their work-from-home data protection as a result of COVID-19, according to IDC. The survey also unearthed that 90.8% of respondents point to modernizing data protection, including backup and disaster recovery, as a …Read More New workloads are driving data protection modernization
Article by Shiela PulidoDue to our dependence on the internet for digital transformation, most people suffer from the risks of cyberattacks. It is an even greater concern this year due to the trend of remote working and international business expansion…Read More The Role of Translation in Cyber Security and Data Privacy
Article by Beau PetersIt is no secret that medical professionals of all levels need to maintain a vast amount of knowledge in their brains at all times. After all, having experience and education is crucial to saving lives and helping patients. Bu…Read More Should Doctors Receive a Cybersecurity Education?
What is the objective of implementing cybersecurity in a business? The answer might vary depending on whether you ask a security professional or a business executive. However, in any cybersecurity implementation, it’s very important to stay focused on …Read More Important Strategies for Aligning Security With Business Objectives
After a year of lockdown, or nearly full lockdown, due to the ongoing health crisis, we learned a lot from how our organizations responded when we all had to change our work habits to a home-office setup. Many companies that had only a casual relations…Read More Protecting Your Electronic Health Records (EHR) With Continuous Monitoring
From losing cherished memories to missing deadlines, the impact of not having backups when a data disaster strikes can hardly be overstated
The post Are you prepared to prevent data loss? appeared first on WeLiveSecurity
Excellent Brookings paper: “Why data ownership is the wrong approach to protecting privacy.”
From the introduction:
Read More The Problem with Treating Data as a Commodity
Treating data like it is property fails to recognize either the value that varieties of personal information serve or the abiding interest that individuals have in their personal information even if they choose to “sell” it. Data is not a commodity. It is information. Any system of information rights — whether patents, copyrights, and other intellectual property, or privacy rights — presents some tension with strong interest in the free flow of information that is reflected by the First Amendment. Our personal information is in demand precisely because it has value to others and to society across a myriad of uses…
Balancing data privacy within an organization is no easy task, particularly for data scientists who need quick access to data, and security and governance teams whose job it is to protect it. Too many of our customers have told us they are being inunda…Read More Closing the data divide: How to create harmony among data scientists and privacy advocates
For billions of individuals around the world, digital identity became critical in 2020. As a result, the global identity verification market, which was already growing rapidly to support the digitization of a whole host of industries, is now booming. W…Read More Five factors driving investment in IDV
In 2020, the pandemic was a radical turning point in the way we work. Office workers were forced to give up their commute and work from home. People from a whole range of industry sectors had to embrace technology, video conferencing and new communicat…Read More 2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?
Databases are the lifeblood store of information for every organization. Without them, the organization’s efficiency, productivity and scope to prosper would be curtailed severely. Protecting the company crown jewels is something that most organization…Read More Database encryption: Protecting the crown jewels
Nowadays, every single organization relies on software and Internet services. This dependence brings along a certain degree of vulnerability. Today’s marketplace businesses are more likely to be disrupted by cybercriminals than real-world crimina…Read More What Is a Zero-Day Vulnerability?
According to TechTarget, a software patch is a “quick-repair job for a piece of programming designed to resolve functionality issues, improve security and add new features.” Although similar to a hotfix, which users can apply without having to restart …Read More What Is a Software Patch?
Virginia is about to get a data privacy law, modeled on California’s law.Read More Virginia Data Privacy Law
How 2020 Has Shaped The Way We Live Our Lives I’ve had such a busy morning! I’ve hunted down my favourite foundation, bought a puzzle mat, stocked up on special dog food for our naughty new puppy, ordered the groceries, made a few appointments and chatted with several friends. And guess what? I haven’t left […]Read More How 2020 Has Shaped The Way We Live Our Lives
Startpage announced results of its survey exploring the attitudes of Americans towards protecting their own privacy online. The results found a gap between the high levels of online privacy awareness and concern respondents report, and the low levels o…Read More Consumers not protecting data online despite having privacy concerns
Over the past decade, the firms that make up the so-called Big Tech have captured enough of the global economy to resemble industrial cartels from a bygone era. Amazon, Apple, Google, Facebook, and Microsoft form behemoths within their respective marke…Read More Big Tech will try to pre-empt harsh privacy laws by writing their own
Genetic testing company with 10 million customers’ data has ‘huge cybersecurity implications’The genetic testing company 23andMe will go public through a partnership with a firm backed by the billionaire Richard Branson, in a deal that has raised fresh…Read More Fears over DNA privacy as 23andMe goes public in deal with Richard Branson
It seems to be the season of sophisticated supply-chain attacks.
This one is in the NoxPlayer Android emulator:
Read More NoxPlayer Android Emulator Supply-Chain Attack
ESET says that based on evidence its researchers gathered, a threat actor compromised one of the company’s official API (api.bignox.com) and file-hosting servers (res06.bignox.com).
Using this access, hackers tampered with the download URL of NoxPlayer updates in the API server to deliver malware to NoxPlayer users.
Despite evidence implying that attackers had access to BigNox servers since at least September 2020, ESET said the threat actor didn’t target all of the company’s users but instead focused on specific machines, suggesting this was a highly-targeted attack looking to infect only a certain class of users…
Affected by a Data Breach? Here Are Security Steps You Should Take We share personal information with companies for multiple reasons: to pay for takeout at our favorite restaurant, to check into a hotel, or to collect rewards at the local coffee shop. While using a credit card is convenient, it actually gives away more […]
The post Affected by a Data Breach? Here Are Security Steps You Should Take appeared first on McAfee Blogs.Read More Affected by a Data Breach? Here Are Security Steps You Should Take
Data Privacy Day (DPD) is January 28. Sounds exciting, right? I’m sure you’ve got the pinata stuffed and the presents on the way. What is DPD about? It’s all about me! We generally don’t like to use this phrase. It’s consi…Read More What Data Privacy Day 2021 Means for Individuals
The cybersecurity landscape continues to evolve as cybercriminals become ever more sophisticated, and digital security tools accelerate to mitigate the risks as much as possible. 2020 presented even more opportunities for hackers to strike, for example…Read More Data Loss Prevention: Artificial Intelligence vs. Human Insight
UK information commissioner calls for international approach to emerging threatThe information commissioner has criticised the “antiquated process” that led to Facebook getting hold of Cambridge Analytica’s servers before the UK regulator itself, and r…Read More ‘Antiquated process’: data regulator on obtaining Cambridge Analytica warrant
How To Stay Safe While Shopping Online This Holiday Season I’m pleased to report that I’ve achieved a number of personal bests in 2020 but the one I’m most proud about is my achievement in the highly skilled arena of online shopping. I’ve shopped online like I’m competing in the Olympics: groceries, homewares, clothing – […]Read More Christmas Shopping 2020
Cristiano Ronaldo tops McAfee India’s Most Dangerous Celebrity 2020 List During COVID-19, people stuck inside have scoured the internet for content to consume – often searching for free entertainment (movies, TV shows, and music) to avoid any extra costs. As these habits increase, so do the potential cyber threats associated with free internet content – […]
The post Cristiano Ronaldo tops McAfee India’s Most Dangerous Celebrity 2020 List appeared first on McAfee Blogs.Read More Cristiano Ronaldo tops McAfee India’s Most Dangerous Celebrity 2020 List
How Searching For Your Favourite Celebrity May Not End Well 2020 has certainly been the year for online entertainment. With many Aussies staying home to stay well, the internet and all its offerings have provided the perfect way for us all to pass time. From free movies and TV shows to the latest celebrity news, […]
The post How Searching For Your Favourite Celebrity May Not End Well appeared first on McAfee Blogs.Read More How Searching For Your Favourite Celebrity May Not End Well
Anna Kendrick Is McAfee’s Most Dangerous Celebrity 2020 During COVID-19, people stuck inside have scoured the internet for content to consume – often searching for free entertainment (movies, TV shows, and music) to avoid any extra costs. As these habits increase, so do the potential cyberthreats associated with free internet content – making our fourteenth […]
The post Anna Kendrick Is McAfee’s Most Dangerous Celebrity 2020 appeared first on McAfee Blogs.Read More Anna Kendrick Is McAfee’s Most Dangerous Celebrity 2020
2020 has propelled us into a new digital reality – one where we are reliant on technology to help us maintain our way of life. This forced all age groups, from 8-80, to learn how to conduct their day-to-day online. I personally had my mother asking a million questions about how to video conference! But while […]
The post Telehealth, Distance Learning, & Online Banking: Securing Digital Frontiers appeared first on McAfee Blogs.Read More Telehealth, Distance Learning, & Online Banking: Securing Digital Frontiers
As a leader in cybersecurity, we at McAfee understand that every aspect of your digital life has potential weak spots that could make you vulnerable to threats and attacks. By incorporating security into everything you do online, you’re better protected from potential threats. To mount your offense, we’ve enlisted a team of partners that puts […]
The post Together, We Block and Tackle to Give You Peace of Mind appeared first on McAfee Blogs.Read More Together, We Block and Tackle to Give You Peace of Mind
Written by Sarah Doherty, Product Marketing Manager at iland Around the world, IT teams are struggling with choosing between less critical, but important tasks, versus focusing on innovative projects to help transform your business. Both are nece…Read More The DRaaS Data Protection Dilemma
Cybercriminals tend to keep with the times, as they often leverage current events as a way to harvest user data or spread malicious content. McAfee COVID-19 Threat Report July 2020 points to a rather significant surge in attacks exploiting the current pandemic with COVID-19 themed malicious apps, phishing campaigns, malware, and ransomware. However, what many users don’t realize is that ransomware attacks are a […]
The post Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure appeared first on McAfee Blogs.Read More Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure
UK information commissioner ‘must ensure government uses public’s data safely and legally’Coronavirus – latest updatesSee all our coronavirus coverageA cross-party group of more than 20 MPs has accused the UK’s privacy watchdog of failing to hold the g…Read More MPs criticise privacy watchdog over NHS test-and-trace data