News
  • "Data Management Firm Exposed Client Info on Open Amazon S3 Buckets: Researchers"

    While a study was being conducted, it was discovered that data from Netflix, TD Bank, Ford and other companies was left exposed for an unknown period of time on publicly configured cloud storage buckets operated by data integration and management company…

  • "Avoid These Top Four Cybersecurity Mistakes"

    The Chief Security and Privacy Officer at Georgian Partners, Alex Manea, has pointed out four common mistakes made by CEOs in their approaches to mitigating the cybersecurity risks faced by their companies. According to Manea, CEOs often skip the…

  • "How Hackers Infiltrate Open Source Projects"

    Open source software included in most enterprises' critical applications is vulnerable to being infiltrated by hackers. According to security professionals, the nature of open source projects provides opportunities for hackers to insert malicious code,…

  • "Medtronic Recalls Vulnerable MiniMed Insulin Pumps"

    Medtronic is recalling its insulin pumps as a result of their vulnerability to being hijacked by hackers. The U.S. Food and Drug Administration (FDA) has warned of the danger of vulnerabilities in Medtronic's MiniMed insulin pumps, stating that the…

  • "The History of Cellular Network Security Doesn’t Bode Well for 5G"

    The 5G mobile communication standard is expected to bring improvements to users. However, there are still concerns surrounding whether 5G will fix security flaws in cell networks or not. Security researchers have already uncovered critical security flaws…

  • "Managing IoT Privacy, Cybersecurity Guidance Released by NIST"

    The National Institute of Standards and Technology (NIST) publication, NISTIR 8228, provides a guide that could be used by federal and private sector organizations in the management of IoT privacy and cybersecurity risks. The report is the first in a…

  • "Disruptive by Design: Intelligence Fusion Inoculates Against Cyber Threats"

    Cyber intelligence fusion is needed to improve upon the identification of cyber threats and the speed at which risks are mitigated by organizations. The fusion of such intelligence can also help organizations learn from cyber incidents in a…

  • "Payment Fraud Linked to Terrorism and Trafficking"

    In a new study, it was discovered that payment card fraud is being used around the world to fund and launder the proceeds from organized crime, drug and human trafficking, terrorism and more. Payment fraud caused over 1 billion dollars in losses…

  • "Another Florida City Is Making a Ransomware Payment, Worth Nearly $500,000 This Time"

    Lake City suffered a ransomware attack that locked the city's phone and email systems. The city made the decision to give into the demands of the hackers by paying them 42 bitcoins, which is equivalent to $490,421. Many businesses often decide to pay…

  • "Hackers Favoring Shimmers Over Skimmers for ATM Attacks"

    Cybercriminals are now using shimmers more than skimmers in the execution of attacks against automated teller machines (ATMs). Skimmers are small devices that can be attached to an ATM's card reader to harvest data as users swipe their cards, which could…

  • "iOS Devices Compromised Again"

    The Media Trust Digital Security and Operations team has discovered a new steganography campaign that targets iOS devices. Steganography is a method that can be used by hackers to hide malicious data or malware in or by way of image files, video clips,…

  • "1 in 10 Open Source Components Downloaded in 2018 had a Known Security Vulnerability"

    In a new study it was discovered that 1 in 10 open source components downloaded in 2018 had known security vulnerabilities.  It was discovered that there was a 71% increase in open source related breaches over the past five years, and that…