Browsing Category
Cybersecurity
TikTok Engaging in Excessive Data Collection
TikTok has been engaging in excessive data collection and connecting to mainland China-based infrastructure, Internet 2.0 has…
Pegasus Spyware Used Against Thailand’s Pro-Democracy Movement
Pegasus spyware is being used against Thailand’s pro-democracy movement, it has been claimed by the Citizen Lab - an…
Tor Browser Adds Automatic Censorship Circumvention
The Tor Project has updated its flagship anonymizing browser to make it easier for users to evade government attempts to block its…
How to Measure the Success of Your Phishing and Security Awareness Training…
By Greg Crowley, CISO, eSentire
Ransomware and crippling cyberattacks are so pervasive they have permeated our social fabric…
Broker Fined £2m for Financial Crime Control Failings
The UK’s financial regulator has issued a multimillion-pound fine to a London-headquartered stock broker after the latter failed…
Public Cloud Customers Admit Security Challenges
Most global organizations aren’t fully confident in the effectiveness of their security controls in the public cloud, despite…
Acquiring Actionable Knowledge Through Collaboration
Why sharing experiences is critical to the success of cybersecurity
By Nicole Mills, Exhibition Director, Infosecurity Group…
Average American Accesses Suspicious Sites 6.5 Times a Day
Data generated by OnePoll from April 28 to May 3 2022 on behalf of AT&T shows that the average person happens upon a…
DHS Releases Report into Log4j Vulnerabilities and Response
This week the US Department of Homeland Security (DHS) released the Cyber Safety Review Board’s (CSRB) first report into the…
The Rapid Development of Endpoint Detection And Response Technology
By Timothy Liu, CTO & Co-founder, Hillstone Networks
In tandem with the evolution of security technology, network attacks…