Data Laundering Poses Privacy, Security Risks

Data laundering, like money laundering, is the act of acquiring data through an illegal means—whether that’s the dark web or a hacked/stolen database—and then taking that data and running it through a legitimate business or process in order to make th… Continue reading Data Laundering Poses Privacy, Security Risks

What the Growing Costs of a Data Breach Means for the Business

A recent global research report conducted by Cybereason, titled Ransomware: The True Cost to Business, revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, in… Continue reading What the Growing Costs of a Data Breach Means for the Business

Ransomware Attacks Leave Lasting Damage

Organizations hit by ransomware attacks also report tightened budgets and lingering impacts on productivity, profitability and security posture, suggesting the extensive damage caused in the wake of ransomware attacks has long-lasting effects. A Keepe… Continue reading Ransomware Attacks Leave Lasting Damage

Estonian Hacker Steals 300,000 Government ID Photos

Estonia’s electronic ID system was hacked last week. Again. A suspect is in custody.
The post Estonian Hacker Steals 300,000 Government ID Photos appeared first on Security Boulevard.
Continue reading Estonian Hacker Steals 300,000 Government ID Photos

Cyberresilience: Your Data Insurance Policy

In the wake of the Colonial Pipeline hack, businesses all over the world are getting a very loud reminder that they could be next to be compromised by a ransomware intrusion. For many, it’s not an ‘if,’ but a case of how and when. Even mul… Continue reading Cyberresilience: Your Data Insurance Policy

Why RaaS Has Become Easier to Launch

Straight from the researchers at Intel 471 comes this pro tip for cybersecurity teams inside organizations: Being proactive about what the cybercriminal underground is learning and how it’s behaving can help you pinpoint solutions for your secur… Continue reading Why RaaS Has Become Easier to Launch

Engaging with governments is a data security priority

Global tax systems are responsible for handling and storing vast amounts of data. Whether it’s details of a supplier’s transactions with its customers, or personal financial information, this data is an important commodity, the protection of which is p… Continue reading Engaging with governments is a data security priority

Ransomware attacks: How to protect against real-life data hostage threats

Ransomware attacks: what they are and how to protect against them using a disaster recovery plan.
The post Ransomware attacks: How to protect against real-life data hostage threats appeared first on NuData Security.
The post Ransomware attacks: How to … Continue reading Ransomware attacks: How to protect against real-life data hostage threats

Phishing Attacks Often Target Small Businesses – Here’s What to Watch for

Scammers target businesses with phishing emails all the time, pretending to be legitimate customers or vendors asking for payment. While any company can be vulnerable to this type of attack, small- to medium-size companies are particularly vulnerable b… Continue reading Phishing Attacks Often Target Small Businesses – Here’s What to Watch for

5 Trends in Computer Science Research

We are in the digital age where our lives depend on the internet of things. A career in computer science attracts the highest starting points in salaries. Career opportunities are numerous and this gives the experts a wide range of choice for computer … Continue reading 5 Trends in Computer Science Research