T-Mobile customers were hit with SIM swapping attacks
The telecommunications giant T-Mobile disclosed a data breach after some of its customers were apparently affected by SIM swap attacks. The telecommunications provider T-Mobile has disclosed a data breach after…
Top 100 Cybersecurity Universities
Ranking the best schools in the world with cybersecurity programs is a difficult feat. You can’t really say that one school is better than another because one school may have…
Thousands of VMware Center servers exposed online and potentially vulnerable to CVE-2021-21972 flaw
A Chinese security researcher published a PoC code for the CVE-2021-21972 vulnerability in VMware Center, thousands of vulnerable servers are exposed online. A Chinese security researcher published the Proof-of-concept exploit code for…
Channeling as A Challenge
By Milica D. Djekic Abstract: The modern cyber systems could deal with some kinds of information leakage concerns such as source, routing, and destination data losses. Any of them can…
Gmail users from US most targeted by email-based phishing and malware
Google revealed that Gmail users from the United States are the most targeted by email-based phishing and malware. A joint five-month study conducted by Google with Stanford University researchers analyzed…
Brave New World: Safari Content Blocking
By Andrey Meshkov, CEO and CTO at AdGuard Content blocking is not a priority for Apple and WebKit. Content blocking in Safari is possible despite all its issues and limitations….
Vulnerability Patching: Why Does It Fall Short So Often?
Weak threat insight, SecOps competing priorities, and fear of making things worse are key reasons By Chris Goettl, Director of Security Product Management, Ivanti It isn’t glamorous. It won’t guarantee…
Data Risk, Intelligence and Insider Threats
When it comes to securing networks in today’s business environment, the single biggest challenge firms must contend with is that of the insider threat. While the term is typically associated…
Cyberattacks On K-12 Education
Carefully allocating limited resources lets districts get the best bang for the buck. By Saryu Nayyar, CEO, Gurucul While we read about a lot of high profile cyberattacks against large…
Over 3.2 billion emails and passwords hacked…find out if you are a victim and what to do about it…
It’s time to consider new passwords and multi-factor authentication or password management tools The current breach is really a compilation of many breaches, hence it’s name “Compilation of Many Breaches”…
How To Keep Your Children Safe In Remote Learning Situations
By Nevin Markwart, Chief Information Security Officer at FutureVault As parents, we have conflicting feelings on remote learning. One on hand, we want our children to stay healthy, especially in…
E-Merchants: Secure Your Online Sales from Cybersecurity Threats
By Anthony Webb, EMEA Vice President, A10 Networks This year, online retailers pushed the boundaries with “Black Friday” deals in the hopes of improving their online sales, thanks to the…