-
Finnish Hotels’ Data Compromised
PRIVACY PRIVACY Cyber-attack on booking system exposes personal data of thousands of high-end hotel guests Read More
-
BIO-ISAC Partners with NY Metro InfraGard
PRIVACY PRIVACY Bioeconomy ISAC and New York Metro InfraGard Members Alliance announce partnership Read More
-
Secret School District Crypto Miner Resigns
PRIVACY PRIVACY Texas school district employee caught mining cryptocurrency at school quits job Read More
-
Ransomware costs show prevention is better than the cure
PRIVACY PRIVACY If you are worried about the financial hit of paying a ransom to cybercriminals, wait until you find out the true cost of a ransomware attack. Read more in my article on the Tripwire State of Security blog. Read More
-
Video Conferencing Apps Sometimes Ignore the Mute Button
PRIVACY PRIVACY New research: “Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps“: Abstract: In the post-pandemic era, video conferencing apps (VCAs) have converted previously private spaces — bedrooms, living rooms, and kitchens — into semi-public extensions of the office. And for the most part, users have accepted these apps…
-
Elon Musk says Twitter DMs should be end-to-end encrypted
PRIVACY PRIVACY Elon Musk’s takeover of the company might bring a swathe of changes to Twitter, including the introduction of end-to-end encryption for direct messages (DMs). Read more in my article on the Hot for Security blog. Read More
-
Ransomware Fallout Costs Seven Times the Ransom Paid
PRIVACY PRIVACY Check Point analysis highlights need for well-planned incident response Read More
-
Bumblebee Malware Loader Has a Sting in the Tail
PRIVACY PRIVACY Researchers warn that malware appears to have replaced BazarLoader Read More
-
Five Eyes Agencies List Top 15 Most Exploited Bugs of 2021
PRIVACY PRIVACY Organizations urged to patch immediately Read More
-
Computer viruses explained: Definition, types, and examples
PRIVACY PRIVACY Computer virus definition A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself. Like other types of malware, a virus is deployed by attackers to damage or take control of a computer. Its name comes from the method by which it…