Home Blog Page 375
A day after a researcher discovered a huge login security flaw in the latest version of Apple’s macOS High Sierra operating system, the company said that it would review its software development process. On November 29, 2017, Apple said...
Contributed by Chris Roberts, Chief Security Architect, Acalvio Technologies Just got asked to put the 2018 predictive hat on...BUT before I do that I want to look back at what I wrote for this year and take an objective (ish) look at...
Contributed by Chris Roberts, Chief Security Architect, Acalvio Technologies So, there’s the distinct possibility I might have gone on a recent rant about hackers and hoodies, masks, gloves and how the media stereotypes us AND how we’ve managed to do the same...
A week after Uber acknowledged a massive data breach, the Washington state Attorney General Bob Ferguson sued the taxi-aggregator for failing to report the incident. On November 28, 2017, Ferguson filed a multimillion-dollar lawsuit against Uber King County Superior...
On November 27, 2017, the independent cybersecurity firm McAfee acquired Skyhigh Networks for an undisclosed amount to bolster its new cloud business unit. In a statement, McAfee said the deal will usher in "a new era in cybersecurity", as...
Three Chinese nationals have been charged by the U.S. prosecutors for hacking into Siemens AG, Trimble Inc, and Moody’s Analytics.  The trio tried to steal business secrets of three companies through “coordinated and unauthorized” cyber attacks between 2011 and...
This whitepaper is contributed by Tari Schreider, Chief Cybersecurity Strategist and Author, Prescriptive Risk Solutions, LLC What is a Bug Bounty Program? Bug or hacker bounty programs go by several names including vulnerability reward program, flaw disclosure, and hacker crowdsourcing. They all...
Image hosting site Imgur, which later metamorphosed into a ‘meme haven’ for social media users, has apparently been subjected to a massive data breach. The hack which occurred in 2014 stole data from 1.7 million users, and Imgur has...
This article featured in a CISO MAG’s edition. Contributed by Akamai Technologies. As more and more companies begin to comprehend the benefits of cloud computing, its adoption is probably highest than ever before. According to the research done by Intel security,...
This article featured in a CISO MAG’s edition. Contributed by Souti Dutta, Lead Threat Analyst - SOC Services, Paladion The Internet has become an “essential fixture” in people’s life. Apart from posting captured moments on Instagram, tweeting life’s experiences on Twitter, and...

MOST POPULAR

RECENT POSTS