Tag "Hackers"

Back to homepage
Software

Easy Steps for Recovery from a Hacked Website

By Julia Sowells Senior Information Security Specialist at Hacker Combat, A website getting hacked is no news today; it has become an almost common thing. So, what to do if your

Software

Countering threats: Steps to take when developing APIs

High profile data breaches resulting from faulty APIs continue to make headlines. In the last few months alone, T-Mobile’s data breach resulted in hackers stealing personal data of more than

Industry Insights

Destructive Cyberattacks Spiked in Q3

Instead of simply fleeing when discovered, adversaries are actively engaging with incident response teams, a new Carbon Black study finds. New data gathered from more than three dozen providers of

Hardware/Network

Flaws in brain stimulation tech could let hackers erase or hold memories for ransom

If security flaws in brain stimulation tech are not fixed, researchers warn that hackers will be able to target your memories, erase them or hold them for ransom in the

Software

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Much of this happens during the development phase, but it includes

IT Compliance

Industry Leaders Reaction On Healthcare.gov Data Breach

It has been reported that hackers breached the following. A HealthCare.gov sign-up system and have gotten their hands on the personal information of roughly 75,000 people. The system is named Federally Facilitated Exchanges

Software

Beware Phishing Attacks With Multiple Replica Sign-Ins

With multi-layer cybersecurity defenses improving, hackers are going to the human attack surface with social engineering and phishing attacks like never before. According to industry reports, over 90 percent of

Hardware/Network

In Praise Of The Hackers

Buried treasure is not just the stuff of fiction and legend. For at least some of our ancestors, it was quite simply the most effective means of protecting prized possessions

Industry Insights

The 3 Most Powerful Types of Threat Information Sharing – and How to Stay Compliant

When it comes to IT security, the unknowns impose the greatest threat. Luckily, many types of threats are very much on the cybersecurity radar. Institutions and organizations who pay attention

Software

In Blockchain, There is no Checkmate

During my time as a Chairman of NATO’s Intelligence Committee and advising government and private companies on cybersecurity, I have noticed the same hacker-shaped hole in the industry. For the