Home Blog Page 257
Internet of Things Vendor Wyze confirmed that it suffered a data breach earlier this month that may have exposed details of 2.4 million users for 22 days. The U.S.-based startup sells IoT devices like security cameras, smart lightbulbs, smart...
Coleman Watson is the Managing Partner of Watson LLP, and his background has a unique blend of engineering, business, and finance interposed with the practice of law. He is a registered patent attorney with the United States Patent &...
Hackers who carried out Maze Ransomware attack in the Pensacola city of Florida have released two gigabytes of data files stolen before encrypting the data on the internet. This was done to prove that they possessed credible data which...
In a quest to strengthen its cybersecurity front, Mastercard announced its agreement to acquire RiskRecon, an artificial intelligence and data analytics solutions provider that helps enhance the cybersecurity needs of its customers. The acquisition has been finalized for an...
For people of Alaska, flight cancellations are common during winter due to heavy blizzards. But in the latest one with RavnAir, a cyberattack threw travelers’ schedule off the runway. RavnAir cancelled at least a half-dozen flights in Alaska following...
By Peter Smith, CEO and Co-founder, Edgewise It’s clear the future of IT lies in hybrid cloud, thanks to its ability to increase an organization’s scalability, agility and cost savings. According to a recent survey from Microsoft, two-thirds of enterprises...
With security being top priority especially in the age where card skimming activities are alarmingly rising, SmartMetric Inc., a fingerprint-based biometric credit and debit cards manufacturer, said that they have now got a breakthrough in increasing the payment cards’...
By Aditya S Apart from configuring cybersecurity measures, the Chief Marketing Officer (CMO) needs to be responsible for taking up cybersecurity practices within their organization. Cybersecurity breaches often coincide with the fact that the CMO is not well-prepared or aware...
The U.S. Federal Law enforcement agency – FBI has quite literally decided to hang the carrot (read fake data) as bait for cyber criminals. The FBI’s exclusive Illicit Data Loss Exploitation (IDLE) program, lures hackers to attack a network...
Upstream Security, a provider of cloud-based automotive cybersecurity solutions, released its 2020 Automotive Cybersecurity Report. The report shares in-depth insights and statistics gleaned from analyzing 367 publicly reported automotive cyber incidents spanning from the past decade onward, while highlighting...