Data is the currency in today’s technology-driven world, and its ever-significant value also drives the extent and increased sophistication of cyberattacks. But how exactly can data be misused to perpetrate cybercrime?
Security researchers and the Norwegian Consumer Council group recently released their findings on several smartwatches designed for kids and reported several vulnerabilities that can compromise privacy and security. Read more
A database containing information on employees from America's top companies and military organizations has been leaked, and the incident reveals the risks involved when companies collect and sell valuable personal data Read more
Research on how the healthcare sector has evolved as a preferred target for cybercriminals, how stolen records are monetized, what types of data are stolen, and how much they're sold for in the underground. Read more
In keeping with this year’s Data Privacy Day theme, Respecting Privacy, Safeguarding Data and Enabling Trust, the GDPR takes center stage in reminding both organizations and individuals the importance of data privacy. Read more
Based on the incidents we saw in 2016 and glimpse of the future we made in our cybersecurity predictions for the coming year, here are the essential cybersecurity resolutions enterprises need to make in 2017. Read more
The General Data Protection Regulation (GDPR) will take effect in May 2018. The new set of reforms for data protection will be a significant milestone that will urge organizations to reassess their data processing controls. What does it mean for SMBs? Read more
The third part of the “Leaking Beeps” series discusses the different types of IT systems connected with unencrypted pages that can be used by attackers for reconnaissance or intelligence gathering. Read more