Thursday, December 5, 2019
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST

Editor's Pick

Ohio Election Day cyber attack attempt traced Russian-Owned Company

Ohio detected and neutralized a cyber attack against its election systems earlier this month, it...

6 Benefits of Using MFT for Encrypted File Transfers

A managed file transfer (MFT) solution is a product that successfully handles all aspects of...

Persistent Cybersecurity Industry Challenges: Salary Survey Finds Parity Gaps for Gender, Diversity and Trouble Sustaining Work-Life Balance

By Trevor Daughney, VP of Product Marketing, Exabeam Annually, Exabeam conducts a Cybersecurity Salary, Skills, and...

RSA Conference Announces Initial 2020 Keynote Speakers

Bedford, MA - Dec 03, 2019 More Details on Additional Speakers and Session Content Coming Soon RSA Conference, the world’s leading information security conferences and expositions,...

RevengeHotels campaign – crooks target the hospitality industry

RevengeHotels campaign - The hospitality industry continues to be a privileged target for cybercriminals that target hotels, restaurant chains, and tourism services. Security experts at...

Facebook and Twitter warn of malicious SDK harvesting personal data from...

Some third-party apps quietly scraped personal information from people's accounts from Twitter and Facebook, the social media companies claim. Facebook and Twitter revealed that some...

3-D Secure: The Legacy Protocol Making a Comeback to Secure Online...

By Jennifer Singh Consumers today are spoiled for choice – which clothes to wear, gadgets to buy and payment networks to use to acquire these...

Data of 21 million Mixcloud users available for sale on the...

The online music streaming service Mixcloud was recently breached by a hacker that is attempting to sell stolen user data in a dark web...

8 Most Common Cyber-security Mistakes You Should Avoid in 2020 and...

By Sam Chester Be it stolen customer data, phishing, or ransomware attacks, successful cyberattacks can affect businesses of any size and in any industry. A...

The Weakest Points in Your Network are Your People

The Weakest Points in Your Network are Your People By Graham Walker, VP Marketing, Allied Telesis “Protect your network borders; don’t let the bad guys in!”...

Two unpatched RCE flaws in rConfig software expose servers to hack

The popular rConfig network configuration management utility is affected by two critical remote code execution flaws that have yet to be patched. rConfig is a completely...

STAY CONNECTED

36,114FansLike
56,109FollowersFollow