
Cryptomining dethrones ransomware as top threat in 2018
Based on trends in the first half of 2018, Webroot found that cybercriminals are shifting to increasingly sophisticated and targeted means of attack while also expanding their …

Privileged account practices are poor, and IT security teams know it
One Identity released new global research that uncovers a widespread inability to implement basic best practices across identity and access management (IAM) and privileged …

Most consumers don’t trust companies to keep personal information secure
High-profile security breaches and changing regulations have raised consumer concerns and pressured businesses, establishing 2018 as a landmark year in the data economy. …

Apple fixes iOS 12 passcode bypass vulnerabilities
Apple has released security updates to address a number of vulnerabilities in iCloud for Windows and iOS, some of which can be exploited by attackers to take control of an …

The end of Google+: Low usage and an API bug that exposed user data
Google has announced that it will be closing down the consumer version of Google+, its failed answer to Facebook, and is introducing more granular Google Account permissions, …

Four critical KPIs for securing your IT environment
In 2018, the average cost of a data breach is more than $3.75 million, and experts expect this number to rise in the coming years. This staggering—and potentially …

945 data breaches led to compromise of 4.5 billion data records in first half of 2018
Gemalto released the latest findings of the Breach Level Index, a global database of public data breaches, revealing 945 data breaches led to 4.5 billion data records being …

Mobile security threats: Lack of visibility is putting businesses at risk
A significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks, according to a study conducted by Enterprise …

Health websites routinely share your activity with 57 third-parties
B9 Systems conducted research into the use of cookies by health websites and discovered that all the major players share your private information with, on average, 57 other …

Most hosting providers take too long to remove malware distribution sites
How long does it take web hosting providers to remove malware distribution sites parked on their network? Roman Hussy, the Swiss security activist behind abuse.ch, says that, …

MikroTik routers with default credentials can be easily compromised
If you own a MikroTik router and you haven’t updated its RouterOS in the last month, you should do so now: Tenable Research has released details about four …

Keeping your cloud malware-free: What you need to know
This year we’ve seen massive malware attacks spanning from nation state campaigns originating in North Korea and Russia to popular restaurants and everything in between. Each …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC