In a recent intelligence report, the U.S. Department of Homeland Security has revealed serious weaknesses in Gmail’s new interface, many of which appear to be highly exploitable. As a top email service released in April 2004, Gmail has become the de-facto mode of digital communication for many people, especially those using an Android mobile device.
Of all the digital threats organizations are facing today, nothing beats the worst of the worst, otherwise known as human error. Data theft, information leaks, virus infections, spear phishing, spam, identity theft, corporate espionage, and the latest, cryptojacking infections are now all working together to compromise the systems and steal the data of online businesses.
As part of the world’s biggest public network, the darknet is not for the faint-of-heart and should be treated as a highly volatile digital environment. Not only is it not accessible through a regular browser and mainstream internet connection—it contains vulnerabilities we haven’t even begun to image. It is not hidden because of secrecy, but
Ponemon Institute in partnership with IBM has recently launched the 2018 Cost of Data Breach report. It comes with a corresponding calculator to give companies a close estimate of the possible business cost if they become a victim of a data breach or security attack. Cost of Data Breach is a yearly report released publicly,
When reviewing their networks and PC installations for unchecked/overlooked attack surfaces, system administrators should always be alert. By definition, an attack surface is the area of a computer installation where an attacker can breach the system. For this reason, it is a critical job for system admins to maintain a computing environment with minimal attack
The recent implementation of GDPR and the race for increased corporate compliance with issues of privacy has generated a lot of noise in the cybersecurity industry, most of which stems from a lack of overall understanding about the new measures—and what they mean for the future of online business. An article recently published by Motherboard suggests
The cryptocurrency trading scene now defines the old adage, “every man for himself.” Without any form of government or state-backed regulation, a blockchain-based currency such as Bitcoin and its derivatives must rely solely on speculation to assess the flow of trading. With all the recent interest in this form of trading and the nature of their
When it comes to keeping business running smoothly, corporate board-of-directors need to be proactive, especially nowadays. This includes supporting the infrastructure that handles the organization’s digital data, storage, and utilization. Not long ago, a company’s Chief Technology Officer (CTO) or Chief Information Officer (CIO) was the central authority in IT decisions; however, that role has
Recent reports claimed that Rakhni, a ransomware strain, has developed a new coinminer component that allows it to sneak into the funds of Bitcoin users. Rakhni is said to have the ability to lurk around a targeted computer before inflicting an attack. It then can either infect a computer right after sneaking in or run
Fourteen months after WannaCry has been introduced to the world, we continue to hear new stories of companies falling for its derivatives and seems like there is no end to the scourge. One way or another firms realize that the installation of an antivirus software is no longer sufficient. Employees make or break the corporate