Tag "Encryption"

Back to homepage
Software

Taken by Ransomware? Certain Skills Required.

Skull and crossbones adorning a pair of Alexander McQueen boots, um yes, please. Skull and crossbones flashing across my PC, uh no, thanks. While the former speaks of swashbuckling ready-to-wear,

Identity Theft

Retail data breaches continue to reach new highs

Thales announced the results of its 2018 Thales Data Threat Report, Retail Edition. According to U.S. retail respondents, 75% of retailers have experienced a breach in the past compared to

Hardware/Network

8 Big Processor Vulnerabilities in 2018

Since the Spectre and Meltdown vulnerabilities knocked the glow off of the new year, 2018 has been the year of the CPU bug. Security researchers have been working in overdrive

Software

Taken by Ransomware? Certain Skills Required

Skull and crossbones adorning a pair of Alexander McQueen boots, um yes, please. Skull and crossbones flashing across my PC, uh no, thanks. While the former speaks of swashbuckling ready-to-wear,

Identity Theft

The Most Common Hack Is Also the Most Successful. Here’s How to Fight It

Despite what movies might show, most hacks don’t involve frantic typing or brute-force attacks. In fact, Verizon’s “2017 Data Breach Investigations” report revealed that 90 percent of successful hacks aren’t

Software

Ransomware back in big way, 181.5 million attacks since January

SonicWall announces record numbers for malware volume, ransomware attacks, encrypted threats and chip-based attacks in the mid-year update of the 2018 SonicWall Cyber Threat Report. “Real-time cyber threat intelligence is more critical than

Identity Theft

Break Risk: Reducing Merchant Risk

Due to the large number of data breaches, 2014 came to be known as the Year of the Breach. The number of high-profile data breach cases making their way into

Software

Quantum random number generator set to transform internet security

The world’s first practical quantum random number generator (QRNG) will reportedly overcome weaknesses of current encryption, revolutionizing internet security.The true randomness of numbers from random number generators (RNG) is not

Mobile

Must Have Factors of a Mobile Security Policy

Mobile devices in the workplace have generated a whole host of cybersecurity issues for companies large and small. Though small and medium sized businesses (SMBs) may think a mobile security

Industry Insights

4 most in-demand cybersecurity skills

As cyber attacks continue to increase in number and escalate in complexity, companies are looking to hire hard-to-find cybersecurity experts to help secure their needs. Here’s a look at the