Over the weekend, an affiliate of cybercriminal gang REvil attacked Kaseya, who provides IT management software to companies across the…
Browsing: cyber-security
While you might not think a gym would be the kind of place cybercriminals would actively pursue, there’s an amazing…
Setting up a decent password for any device is not just a good idea, it’s an essential step in securing…
The most astounding thing about the Experian security breach of 24-million South Africans’ personal data is not that the credit…
The brutal war in Yemen may appear like any traditional regional conflict with guns on the ground, but it is…
The deluge of cyberattacks sweeping across the world has governments and companies thinking about new ways to protect their digital systems, and the corporate and state secrets stored within. For a long time, cybersecurity experts have erected firewalls to keep out unwanted traffic and set up decoy targets on their networks to distract hackers who do get in. They have also scoured the internet for hints about what cybercriminals might be up to next to better protect themselves and their clients.
Internet-enabled, or internet of things, devices are so common, and so vulnerable, that hackers recently broke into a casino through its…
When malicious software, or malware, attacks, computer scientists and security researchers want to know how the attackers got into what…
With the appearance of robotic financial advisors, self-driving cars and personal digital assistants come many unresolved problems. We have already…