Security and Culture are Key to Digital Transformation

With digital business initiatives accelerating across nearly every industry, Gartner projects worldwide IT spending to reach a whopping $4.1 trillion by the end of the year. This data reflects something every forward-looking business leader already kn… Continue reading Security and Culture are Key to Digital Transformation

Defending Against Pervasive Spyware

The revelation that Israeli company NSO Group’s spy software Pegasus was targeting the smartphones of activists, journalists and business executives sent a shockwave through the international press. The spyware successfully infiltrated the mobile devi… Continue reading Defending Against Pervasive Spyware

Apple’s Insecure iPhone Lets NSO Hack Journalists (Again)

Yet another zero-day bug in iOS has allowed notorious spyware vendor NSO Group to break into the iPhones of journalists and activists.
The post Apple’s Insecure iPhone Lets NSO Hack Journalists (Again) appeared first on Security Boulevard.
Continue reading Apple’s Insecure iPhone Lets NSO Hack Journalists (Again)

Zero-Trust is an Adjective Without a Noun

People love to talk about zero-trust right now, for a number of reasons. It has the word “zero” in there, which has some history in the information security world (e.g., zero-day vulnerabilities). It’s also a simple and eye-catching phrase, so it fits… Continue reading Zero-Trust is an Adjective Without a Noun

Deepfakes: The Next Big Threat

A number of mobile apps give anyone with a smartphone and a few minutes of time on their hands the ability to create and distribute a deepfake video. All it takes is a picture of, say, yourself that you’d swap with an actor in a movie or a telev… Continue reading Deepfakes: The Next Big Threat

Rising Threats Target Cloud Providers, Virtual Infrastructure

A growing number of cybercriminals are developing malware to conduct attacks on virtualized environments, and some are aggressively trying to exploit vulnerabilities already found in software for deploying virtual infrastructure, according to a report… Continue reading Rising Threats Target Cloud Providers, Virtual Infrastructure

White House Accuses China of Microsoft Exchange Attack

Russia may have drawn the lion’s share of scorn for a recent string of cyberattacks against U.S. and global interests, but the Biden administration and a bevy of allies and partners blame China for the assault on Microsoft’s email system. Noting… Continue reading White House Accuses China of Microsoft Exchange Attack

The Second Wave of a Ransomware Pandemic

In January, we published the Ransomware Pandemic, a report discussing the ever-evolving threat of ransomware and the growing devastation disseminated by these malicious malware strains. The report discussed the future forecast for ransomware and how w… Continue reading The Second Wave of a Ransomware Pandemic

Cyber Games Offer Competitive Challenges

With high-profile public and private institutions in the U.S. facing a growing threat from cybercriminals and cyberattacks, there is a growing push to prepare the next generation of potential IT security pros to meet the challenges. Cyber games are on… Continue reading Cyber Games Offer Competitive Challenges

Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data

A new book exposes yet another Facebook failure for the social media firm to say sorry about. But nothing’s going to change.
The post Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data appeared first on Security Boulevard.
Continue reading Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data