News

  • PII May Have Been Stolen in Virginia County Ransomware Attack

    PRIVACY PRIVACY A W-2 form was reportedly published on a dark web forum with stolen, sensitive data Read More

    Read More

  • US Census Bureau Head Fends Off Critics of ‘Differential Privacy’ Tool

    PRIVACY PRIVACY Santos defended differential privacy against prominent researchers Read More

    Read More

  • Ransomware attackers allegedly demand ransom from AIIMS: police deny report

    PRIVACY PRIVACY A hacker has allegedly demanded Rs 200 crore in cryptocurrency from the All India Institute of Medical Science (AIIMS) after it was hit by a ransomware attack on November 23, according to a report by Press Trust of India (PTI). The Delhi police, however, have denied the report. In a Tweet on Monday night, the law…

    Read More

  • BrandPost: SASE: The Only Way to Improve Network Security Without Added Complexity

    PRIVACY PRIVACY By: Mike Spanbauer, Field CTO, Security at Juniper Networks The future of network security has a new shiny architecture to meet organizational needs with Secure Access Service Edge (SASE). Still, most network administrators are either not ready or able to decommission their existing on-premisessecurity solutions. Organizations are much more likely to need to support…

    Read More

  • What Are Tailgating Attacks and How to Protect Yourself From Them

    PRIVACY PRIVACY Whether you’re spending time on the web or working in the office, you want peace of mind knowing that you are in a safe environment. While most of us know to take precautions when online — protecting ourselves from things like phishing attacks and other cyber threats — we should also attend to…

    Read More

  • CTA “mud” Actively Leaking K-12 Directories on Breach Forums

    PRIVACY PRIVACY A cyber threat actor (CTA) on “Breach Forums” who’s employing the username “Mud” is actively leaking K-12 entities’ student/faculty directories. Read More

    Read More

  • Charles V of Spain Secret Code Cracked

    PRIVACY PRIVACY Diplomatic code cracked after 500 years: In painstaking work backed by computers, Pierrot found “distinct families” of about 120 symbols used by Charles V. “Whole words are encrypted with a single symbol” and the emperor replaced vowels coming after consonants with marks, she said, an inspiration probably coming from Arabic. In another obstacle,…

    Read More

  • 5 Tips for protecting your connected vehicle against Cyberattacks

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  As more connected vehicles hit the road, cyberattacks are increasing. Deloitte estimates that there will be over 470 million connected cars…

    Read More

  • Police Shutter 13,000 Sites in Piracy Crackdown

    PRIVACY PRIVACY Fourteen detained as part of Europol operation Read More

    Read More

  • Ireland’s DPC Fines Meta €265m Following Large-Scale Data Leak

    PRIVACY PRIVACY The fine followed an inquiry into data processing by Meta in response to a major data breach Read More

    Read More

News, Advisories and much more

Exit mobile version