When companies fall victim to a cyberattack, the first thing they do is eliminate the threat. But for cybersecurity investigators, that’s just the first part of their job. Like real-world…
Read MoreWhen companies fall victim to a cyberattack, the first thing they do is eliminate the threat. But for cybersecurity investigators, that’s just the first part of their job. Like real-world…
Read MoreIn order for an organization to properly respond to a breach or incident, they need to have a proper incident response team. These are the people who are responsible for…
Read MoreDefining Data Exfiltration Also referred to as data theft or exportation, data exfiltration is when an unauthorized transfer of data occurs from one device to another. This can be done…
Read MoreHackers have stolen almost around $41 million in bitcoin from the crypto exchange Binance. In a report dated May 7, 2019, Nikhilesh De of CoinDesk writes, “Hackers stole more than…
Read MoreAt first glance, having IoT (Internet-of-Things) devices makes our lives easier and more convenient. Imagine today of not able to watch streaming videos from a 65-inch TV in the living…
Read MoreA security breach has reportedly forced the Australian government to reset its computing network. News reports say that the federal government has confirmed a security incident impacting its network and…
Read MoreA security breach has impacted the POS (Point of Sale) system at Huddle House, the U.S-based casual dining and fast food restaurant chain. An official breach announcement dated February 1,…
Read MoreA case of ‘better late than never’, Nova Entertainment, a mainstream Aussie Media firm publicly confessed that during the period between May 2009 to October 2011 (from seven to nine…
Read MoreMozilla, for many decades is working hard in order to regularly deliver to us a security-conscious browser we all know and love. However, there are times that Mozilla offers snippets…
Read MoreIt’s a comprehensive approach that Facebook adopts when it comes to securing data. Rather than just focus on security as something that’s mere tech, Facebook prefers to integrate physical security…
Read More