Privacy regulations such as the GDPR and CCPA require companies to provide "reasonable security" to protect customers' personal information. Here's how you might best achieve that standard.
Cybersecurity investigator Brian Krebs put Wipro in a tough spot by bringing up a critical data breach in the midst of a quarterly earnings call. Wipro called the incident a zero-day attack and has employed a forensic investigator to probe the incident.
When you forget your Gmail password, and have two factor authentication (2FA) enabled, Google will SMS or call you with a six to eight digit code. You enter the code (Google calls this 2-step verification) and gain access to your account.
The bears, pandas, kittens and chollimas are out in the open, and the military top-brass is apprehensive. Michael Sentonas, VP of Technology Strategy at CrowdStrike, gives us a dekko at the cyber espionage threat landscape.
Researchers have uncovered an invitation-only Tor-concealed marketplace where stolen credit card details are bundled with the victim's device fingerprint, meaning criminal buyers can use them to beat numerous fraud detection systems.
A fresh round of hoax invoice notifications claiming to be from Xero have landed in user inboxes, as the cloud accounting provider once again falls foul of cyber criminal impersonators.
Kaspersky Lab finds that out of all the TV show disguises that’s used to distribute malware, Game of Thrones tops the list in 2018 and 2017.
The key to better security lies in adopting a differentiated human-centric approach to cybersecurity, where people—rather than IT infrastructure—become the new perimeter.