A Belgian security researcher has discovered a "serious weakness" in the WPA2 security protocols used to encrypt many WiFi communications. Attackers can exploit the flaws to eavesdrop as well as potentially inject code such as malware or ransomware into WiFi-connected systems. Prepare for patches.
The RSA Conference returns to Abu Dhabi in November, and event organizers Linda Gray Martin and Britta Glade say this year's agenda is packed with new speakers and topics unique to this growing annual event.
Defending against tomorrow's mobile attacks is a moving target; but new technologies and strategies, including behavioral biometrics and machine-learning-based analytics, are allowing financial institutions to reduce their fraud losses while enhancing their customer experience.
Based on the latest results of ISMG's...
Security researchers have discovered websites run by credit bureaus Equifax and TransUnion were both affected by dodgy code that redirected users to adware and malware. Both issues are fixed, but the situations beg questions about how closely the companies monitor their online security.
For the second time in two years, Hyatt Hotels suffered a payment card data breach after attackers infected payment card processing systems with malware. The latest breach lasted for over three months and affected 41 Hyatt hotels across 11 countries.
Organizations today are making the same security mistakes with APIs that they made with their websites 10 years ago. Common mistakes such as unnecessary bloat of API responses, making too many round trips for content and ignoring some of the low-hanging protocol fruit are negatively impacting both security and...
Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data - and hold it hostage until payment is made. So how can you keep your organization's data protected?
Download this whitepaper and learn:
Why ransomware has seen such explosive growth
How to recover encrypted data more...
Is the European GDPR going to change your data security strategy?
Organizations around the world that serve customers and individuals in the EU will be required to put in place security policies to address different risks and effectively enforce these policies with technical controls - or potentially face fines of...
It's a tale that reads stranger than fiction, a true Tom Clancy-ish yarn: Israeli spies hacked Kaspersky Lab, discovering that Russia has been using the company's pervasive anti-virus software to spy on U.S. spies. Will Kaspersky Lab survive?
Federal agencies that adopt the Threat Lifecycle Management strategy can achieve immediate and ongoing cost savings as compared to adopting any other SOC model. This strategy also leads to a material reduction in risk for the organization.
Download this whitepaper and learn how your SOC can:
Use advanced...
The dark web is notorious for dangerous content which dominates discussions in popular media. In order to understand the dark web beyond the myths and the industry hype, it is necessary to understand the content of the system as well as how the websites, users and activities on the dark web are connected to each...
The dark web has become a very effective resource for purchasing sinister educational materials. How-to guides are for sale on major dark web markets such as Hansa and AlphaBay and offer step-by-step instructions for drug trafficking, hacking, social engineering and many other cyber crimes.
Fraud guides, a subset...
Dark web vendors offer a wide range of technological crime. From distributed denial of service (DDoS) attacks to pre-recorded phone calls, there is a myriad of knowledge and listings for hacking & exploits.
In addition to materials for sale, the dark web is also home to a variety of forums designed to build...
What role do employees play in a business's fight against cybercrime? A very important one.
A survey of over 5,000 businesses around the globe found that just over half of businesses believe that they are at risk from within. Meanwhile, careless or uninformed employees contributed to 46% of cybersecurity incidents...
Among SMBs, the average total impact of a data breach amounts to $87,800. For enterprises, it is more than ten times higher at $992,000.
Does your company view IT security as a cost center that must be endured or a strategic investment that ensures business continuity and protection?
Download this eBook and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.