Cybersecurity

Blackberry launches Blackberry Labs to develop cybersecurity solutions

BlackBerry Ltd. is looking to ramp up its cybersecurity research and development by today announcing the launch of a new business unit entitled BlackBerry Advanced Technology Development Labs (BlackBerry Labs). The unit will be headed by BlackBerry’s chief technology officer, Charles Eagan, and will include a team of over 120 software developers, architects, researchers, product […]

Blackberry launches Blackberry Labs to develop cybersecurity solutions Read More »

Google faces antiturst probe for trying to make Chrome safer

Google has been subject to various antitrust investigations in the recent past. Now, fresh allegations are being dumped on the Mountain View-based tech company for planning to adopt a new internet protocol called DNS over HTTPS (DoH). An investigation is being conducted by the US House Judiciary Committee, reports Wall Street Journal. Investigators want to

Google faces antiturst probe for trying to make Chrome safer Read More »

German police shut down dark web data center in former NATO bunker

German police have arrested seven people following a raid on an illegal data center in a former NATO military bunker that was hosting dark web sites promoting illegal content. The raid, which took place in the town of Traben-Trarbachsaw saw the arrest of the owner of the bunker, an unnamed 59-year-old Dutchman and six others with

German police shut down dark web data center in former NATO bunker Read More »

How to Protect a Small Business From a Data Breach: A Guide to Data Breach Best Practices

TheDigitalArtist / Pixabay The number of enterprise data breaches has grown exponentially. However, small businesses still fail to pay attention to it. There are many ways businesses can prevent security breaches, but owners of small companies tend to ignore it because they don’t believe that it could happen to them. Small businesses also fail to

How to Protect a Small Business From a Data Breach: A Guide to Data Breach Best Practices Read More »

3 Reasons Why Killing Passwords Improves Your Cloud Security

Jack Dorsey’s Twitter account getting hacked by having his telephone number transferred to another account without his knowledge is a wake-up call to everyone of how vulnerable mobile devices are. The hackers relied on SIM swapping and convincing Dorsey’s telecom provider to bypass requiring a passcode to modify his account. With the telephone number transferred,

3 Reasons Why Killing Passwords Improves Your Cloud Security Read More »

Can Too Much Cybersecurity Be Bad for Your Small Business?

By Samuel Bocetta If you run a small business, security is probably near the top of your priority list—and if it’s not, it should be. Businesses are the most common targets for cyberattacks, and the consequences of having data stolen can be huge ever since the passage, implementation, and consequences of the GDPR (General Data

Can Too Much Cybersecurity Be Bad for Your Small Business? Read More »

Five Eyes Sign Intelligence Agreement to Target China

The Five Eyes gained worldwide attention and notoriety in the wake of the Snowden revelations. The Five Eyes is an intelligence alliance comprised of the United States, United Kingdom, Canada, Australia and New Zealand. The agencies of the five countries share intelligence and cooperate in the global War on Terror. Now, according to a joint

Five Eyes Sign Intelligence Agreement to Target China Read More »

Microsoft Patches Serious Flaw In Internet Explorer

Microsoft has released an emergency fix for Windows 10, following the discovery of a serious flaw in Internet Explorer. The flaw is a remote code vulnerability—one of the most dangerous types of security flaws, as it opens the way for a hacker to remotely take control of an affected system. At the root of the

Microsoft Patches Serious Flaw In Internet Explorer Read More »

Akamai Acquires KryptCo, Makers of Authentication Technology

Akamai Technologies, one of the world’s premier content delivery networks (CDN), just announced its acquisition of KryptCo. KryptCo is the creator of a mobile, multi-factor authentication mechanism that, unlike many competing solutions, doesn’t require a pin number for authorization. As a result, KryptCo’s technology is resistant to phishing attempts. Akamai has a long-standing reputation as

Akamai Acquires KryptCo, Makers of Authentication Technology Read More »

5 Key Insights From Absolute’s 2019 Endpoint Security Trends Report

Endpoint security tools are 24% of all IT security spending, and by 2020 global IT security spending will reach $128B according to Morgan Stanley Research. 70% of all breaches still originate at endpoints, despite the increased IT spending on this threat surface, according to IDC. To better understand the challenges organizations have securing the proliferating

5 Key Insights From Absolute’s 2019 Endpoint Security Trends Report Read More »

?
WP Twitter Auto Publish Powered By : XYZScripts.com