This month, WizCase researchers discovered 5 separate data leaks of personal information belonging to dating app users in the US, Japan and South Korea. The data, which was easily accessed due to misconfigured and unsecure servers, included user inform… Continue reading 5 Dating Apps Leak More than 1 Million User Profiles and Sensitive Information
We have all seen the carefully prepared statement. A cyber incident has occurred, we are investigating but please do not worry since no data has left our network. Perhaps we will also see the obligatory inclusion of a ‘sophisticated’ threat actor by wa… Continue reading Data exfiltration: The art of distancing
In one second, the human eye can only scan through a few photographs. Computers, on the other hand, are capable of performing billions of calculations in the same amount of time. With the explosion of social media, images have become the new social cur… Continue reading New technique keeps your online photos safe from face recognition algorithms
Hackers are once again finding unsecured MongoDB databases carelessly left exposed on the internet, wiping their contents, and leaving a ransom note demanding a cryptocurrency payment for the data’s safe return. As ZDNet reports, ransom notes hav… Continue reading 22,900 MongoDB Databases Held to Ransom by Hacker Threatening to Report Firms for GDPR Violations
Security researchers spotted Trickbot malware checking the screen resolution as a means of evading analysis on a virtual machine (VM). Digital security firm MalwareLab came across a sample of the trojan that checked to see whether a computer’s sc… Continue reading Trickbot Malware Using Screen Resolution Checks as Anti-VM Tactic
Key management must give way to new options that enable and protect true encryption for organizations For as long as they’ve existed, web applications have been a favorite target for hackers. They are relatively easy to break and give hackers potentia… Continue reading White-Box Encryption: Ending Web App Vulnerability
Security researchers detected a new ransomware strain that leveraged piracy as a means of distributing itself to Mac users. On June 29, a Twitter user reached out to Malwarebytes about a malicious Little Snitch installer that was available for download… Continue reading New Mac Ransomware Leveraged Piracy as Means of Distribution
Last month, Google removed 25 Android apps from its Google Play Store after discovering they were stealing users’ Facebook account credentials. The malicious apps, identified by security company Evina, appeared to be created by the same developer… Continue reading Google Removes 25 Malicious Google Play Apps Stealing Facebook Login Credentials
The post Data Loss Protection for the Hybrid Cloud appeared first on CCSI.
The post Data Loss Protection for the Hybrid Cloud appeared first on Security Boulevard.
Continue reading Data Loss Protection for the Hybrid Cloud
More and more companies, self-employed and private customers are using Boxcryptor to protect sensitive data – primarily in the cloud. Boxcryptor ensures that nobody but authorized persons have access to the data. Cloud providers and their staff, as wel… Continue reading A Boxcryptor audit shows no critical weaknesses in the software