According to authentication security key manufacturer Yubico, IT managers and end users still have a long way to go before password and authentication practices are strong enough to protect an entire organization. The company last week released its second annual State of Password and Authentication Security Behaviors Report in conjunction with technology research organization Ponemon […]
Popular Tags within: Network SecurityCybersecurity ransomware Zoom Hybrid Work Remote Work Microphones Cisco UCC Webex Crestron
Firefox users in the U.S. will soon have increased privacy and security when browsing the web thanks to parent company Mozilla’s new DNS-over-HTTPS security feature. DNS-over-HTTPS (DoH), is a technology standard proposed by the Internet Engineering Task Force that brings a level of encryption to your internet traffic. Currently, your internet browser converts the URL […]
Cyber criminals are reportedly exploiting vulnerability in a WordPress plugin that allows them to erase website databases, and some entire websites have been seized. According to website security firm WebARX, the ThemeGrill Demo Importer plugin was the culprit, and it had more than 200,000 active installations, however that has since dropped to about 100,000 as […]
The more technology is used, the more users’ data is at risk. One expert says better government action and legislation could fix this.
Microsoft ahead of cybersecurity conference RSA 2020 has announced several new security features coming to various platforms, including the general availability of Microsoft Threat Protection and security features coming to mobile platforms. According to a company blog post, Microsoft Threat Protection (MTP) uses artificial intelligence and combines other capabilities from the company’s other security products […]
While the EARN IT Act appears to stop unlawful content distribution, tech experts think there might be a hidden agenda in the undercurrent.
Microsoft last week patched almost 100 security vulnerabilities in several versions of Windows operating systems, including a zero-day vulnerability in Internet Explorer that was actively being exploited. This should be an example as to why enterprises should quickly install new updates as they become available and only use the latest versions of operating systems. Cybersecurity […]
You go to work in the morning, but your boss stops you before you can sit down and start up your computer at your work station. An attacker accessed your company’s networks and is holding your data hostage for a ransom of bitcoin, and nobody at the company can access the files they need to […]
Security breaches often bring to mind malicious attackers hacking into computer systems… But major healthcare system breaches have shown vulns are more often the result of system misconfiguration. While such breaches cause significant reputational damages, HIPAA fines can add insult to injury, with the healthcare sector average fine of $6.45 million, leading all other sectors. This creates […]
Cybercriminals utilize a variety of tools to steal your information, your money and your secrets. Now, they’re holding your company’s digital marketing ransom and demanding bitcoin, according to cybersecurity researcher and journalist Brian Krebbs. KrebsOnSecurity reported that a new email-based extortion scheme is targeting website owners serving banner ads through Google’s AdSense program. The criminals […]