Coronavirus-themed spam surged 14,000% in two weeks says IBM

Coronavirus-themed spam surged 14,000% in two weeks says IBM

Since February, spam exploiting the novel coronavirus has jumped by 4,300% and 14,000% in the past 14 days, according to IBM X-Force, IBM’s threat intelligence…

View More Coronavirus-themed spam surged 14,000% in two weeks says IBM
Spectre and Meltdown explained: A comprehensive guide for professionals

Spectre and Meltdown explained: A comprehensive guide for professionals

Staying up to date on Spectre and Meltdown can be challenging. This guide includes in-depth explanations about these uniquely dangerous security vulnerabilities and the best…

View More Spectre and Meltdown explained: A comprehensive guide for professionals
Mysterious Hacker Group Eavesdrops On Corporate Email And FTP Traffic

Mysterious Hacker Group Eavesdrops On Corporate Email And FTP Traffic

Since at least early December 2019, a mysterious hacker group has been taking over DrayTek enterprise routers to eavesdrop on FTP and email traffic inside…

View More Mysterious Hacker Group Eavesdrops On Corporate Email And FTP Traffic
Source code of Dharma ransomware pops up for sale on hacking forums

Source code of Dharma ransomware pops up for sale on hacking forums

The source code of a major ransomware strain named Dharma has been put up for sale on two Russian hacker forums over the weekend. The…

View More Source code of Dharma ransomware pops up for sale on hacking forums
Assume breach is for losers: These steps will stop data breaches

Assume breach is for losers: These steps will stop data breaches

“Assume breach” is the popular computer defense strategy based on the idea that your company is either already breached or could easily be breached by…

View More Assume breach is for losers: These steps will stop data breaches
Instagram website leaked phone numbers and emails for months, researcher says

Instagram website leaked phone numbers and emails for months, researcher says

Instagram’s website leaked user contact information, including phone numbers and email addresses, over a period of at least four months, a researcher says. The source…

View More Instagram website leaked phone numbers and emails for months, researcher says
New Attack Creates Ghost Taps On Modern Android Smartphones

New Attack Creates Ghost Taps On Modern Android Smartphones

Modern Android smartphones are susceptible to a new type of attack named “Tap ‘n Ghost” that can induce fake finger taps to take unwanted actions.…

View More New Attack Creates Ghost Taps On Modern Android Smartphones
Facebook Ordered By U.S. Judge To Turn Over Data Privacy Records

Facebook Ordered By U.S. Judge To Turn Over Data Privacy Records

A U.S. judge ordered Facebook Inc to give shareholders emails and other records concerning how the social media company handles data privacy after data for…

View More Facebook Ordered By U.S. Judge To Turn Over Data Privacy Records
How businesses plan to protect themselves against cyberattacks

How businesses plan to protect themselves against cyberattacks

Many organizations will spend more to shore up their defenses against cyber attacks this year, says business insurance provider Hiscox. Cyber attacks continue to rise…

View More How businesses plan to protect themselves against cyberattacks
A guide to securing application consistency in multi-cloud environments

A guide to securing application consistency in multi-cloud environments

Cloud computing. It is like a well-trodden path when it comes to talking about digitalization. Multi-cloud is another term that has crossed many lips, and…

View More A guide to securing application consistency in multi-cloud environments