Malware Steals Data By Adjusting Screen Brightness

Malware Steals Data By Adjusting Screen Brightness

A security researcher has discovered a novel way to steal data from a PC that isn’t connected to a network (air-gapped) by manipulating the brightness…

View More Malware Steals Data By Adjusting Screen Brightness
How The Washington Privacy Act Compares To GDPR And CCPA

How The Washington Privacy Act Compares To GDPR And CCPA

Washington legislators recently introduced the Washington Privacy Act (WPA). This legislation is a consumer-focused privacy law similar to the California Consumer Privacy Act (CCPA) but it also…

View More How The Washington Privacy Act Compares To GDPR And CCPA
What Is ISO 27001, ISMS and Do We Need It?

What Is ISO 27001, ISMS and Do We Need It?

Some time ago a friendly colleague reached out to me asking about ISO 27001. The questions were simple but got me thinking. I then realized…

View More What Is ISO 27001, ISMS and Do We Need It?
Hackers are hijacking smart building access systems to launch DDoS attacks

Hackers are hijacking smart building access systems to launch DDoS attacks

Hackers are actively searching the internet and hijacking smart door/building access control systems, which they are using to launch DDoS attacks, according to firewall company…

View More Hackers are hijacking smart building access systems to launch DDoS attacks
Hackers using coronavirus scare to spread Emotet malware in Japan

Hackers using coronavirus scare to spread Emotet malware in Japan

Cybercriminals are using global fears about the virus to spread the Emotet trojan. Researchers with IBM X-Force and Kaspersky have discovered that cybercriminals are spreading…

View More Hackers using coronavirus scare to spread Emotet malware in Japan
Becoming ISO 27001 certified – How to prepare for certification audit

Becoming ISO 27001 certified – How to prepare for certification audit

If you think writing a bunch of information security documents is enough to get ISO 27001 certificate, you’re wrong. You need to implement all the activities described…

View More Becoming ISO 27001 certified – How to prepare for certification audit
What are the 3 Most Common Access Risks?

What are the 3 Most Common Access Risks?

These days it seems like there are security solutions for almost everything except, the one thing you can never fully secure – humans. But, while…

View More What are the 3 Most Common Access Risks?
Target Sues Insurer Over Data Breach Costs

Target Sues Insurer Over Data Breach Costs

Target is suing its insurer for costs of up to $74M that were incurred as a result of a data breach. America’s eighth-largest retailer claims…

View More Target Sues Insurer Over Data Breach Costs
Equifax used 'admin' as username and password for sensitive data: lawsuit

Equifax used ‘admin’ as username and password for sensitive data: lawsuit

Equifax (EFX) used the word “admin” as both password and username for a portal that contained sensitive information, according to a class-action lawsuit filed in…

View More Equifax used ‘admin’ as username and password for sensitive data: lawsuit
Nearly 60% of businesses suffered a data breach in the past 3 years

Nearly 60% of businesses suffered a data breach in the past 3 years

In the spirit of October being the 16th Annual National Cybersecurity Awareness Month, a recent Bitdefender study outlined the cybersecurity conditions of infosecurity companies across…

View More Nearly 60% of businesses suffered a data breach in the past 3 years