Exposed Consumer Data Skyrocketed 126% in 2018
February 5 2019The number of data breaches dropped overall, but the amount of sensitive records exposed jumped to 446.5 million last year, according to the ITRC. Good news: The number of...
Read moreThe number of data breaches dropped overall, but the amount of sensitive records exposed jumped to 446.5 million last year, according to the ITRC. Good news: The number of...
Read moreThe number of data breaches dropped overall, but the amount of sensitive records exposed jumped to 446.5 million last year, according to the ITRC. Good news: The number of...
Read moreCayosin brings together multiple strands of botnet tech and hacker behavior for a disturbing new threat. When botnet-as-a-service meets social media marketing, you have a threat poised to rapidly...
Read moreCayosin brings together multiple strands of botnet tech and hacker behavior for a disturbing new threat. When botnet-as-a-service meets social media marketing, you have a threat poised to rapidly...
Read moreGodaddy.com, the world’s largest domain name registrar, recently addressed an authentication weakness that cybercriminals were using to blast out spam through legitimate, dormant domains. But several more recent malware...
Read moreGodaddy.com, the world’s largest domain name registrar, recently addressed an authentication weakness that cybercriminals were using to blast out spam through legitimate, dormant domains. But several more recent malware...
Read moreIf you absolutely have to have Amazon Alexa or Google Assistant in your home, heed the following advice. Image Source: Adobe Stock: bht2000 Experienced security pros like Amy DeMartine...
Read moreIf you absolutely have to have Amazon Alexa or Google Assistant in your home, heed the following advice. Image Source: Adobe Stock: bht2000 Experienced security pros like Amy DeMartine...
Read moreThe unique threat landscape requires a novel security approach based on the latest advances in network and AI security. Security always lags behind technology adoption, and few technologies have...
Read moreThe unique threat landscape requires a novel security approach based on the latest advances in network and AI security. Security always lags behind technology adoption, and few technologies have...
Read more
Recent Comments