Hackers Deliver Malware by Injecting Code Into CCleaner
Most security experts will tell you that only trusted sources should be used when downloading and installing software, but what happens when that trusted source is also hacked? Such is the case with a...
View ArticleThe number of devastating cyberattacks is surging — and it’s likely to get...
2017 has surely turned out to be a fruitful year for cybercriminals. Only halfway through, and we have witnessed some major meltdowns including the Mayday situation that was the WannaCry Ransomware...
View ArticleGoogle’s VP of Security and Privacy Fears for Society’s Future Protection
Hacking is no longer for teenagers who want to play shenanigans online. Hacking is now a business for profit, and it’s even a political tool. In 2014, Sony Pictures found out what hackers can do when...
View ArticleBad Rabbit Rips through Europe
No other malware on the market puts users at such a disadvantage as ransomware. Several attacks including WannaCry and Petya have crippled entire countries from government to private businesses....
View ArticleThe Biggest DDoS in History Hits the BBC and Donald Trump’s Website
Cyber threats continue to get bigger and bigger each year. Last year, the Ashley Madison hack was considered the biggest breach in history. Just a few months later, hackers outdid themselves again and...
View ArticleTips for Creating a Successful Cyber Security Policy
Every year, businesses lose millions in security breaches. As a matter of fact, Ponemon estimates that the total cost for data breaches is $3.79 billion. More businesses are feeling the weight of cyber...
View ArticleRecent Studies Show That Cyber Security is Still Not a Board Priority
The last few years have seen some of the biggest data breaches to date. Even with companies losing millions to lawsuits and fines, a recent Fortinet Global Enterprise Security survey shows that most IT...
View ArticleInsights Q&A: Why are Pent Tests Important?
1. What is a penetration test? Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could...
View ArticleSEC Looks for Additional Help After Hackers Profit from Stock Trades
One advantage hackers have is their ability to stay hidden even in the most advanced systems. The U.S. Securities and Exchange Commission (SEC) learned just how well hackers can remain concealed and...
View ArticleCyber Security Experts Call to Action on Medical Devices
Cyber Security Experts Call to Action on Medical Devices Cyber security in the healthcare industry has long been a major topic with security experts, but these companies continue to be one of the most...
View ArticleIndia Has the Greatest Risk During a Cyber Attack
India has a talented pool of IT professionals, but a recent report from a Russian security firm claims that India couldn’t handle a massive cyber attack. The firm claims that an attack on the same...
View ArticleHeathrow Airport Investigation after a USB Stick Found on the Streets
Heathrow Airport launched an investigation last week after a USB stick was found on the streets. What seemed like harmless negligence was actually a huge breach of data. The USB stick had 76 folders...
View ArticleHeathrow Airport Investigation after a USB Stick Found on the Streets
Heathrow Airport launched an investigation last week after a USB stick was found on the streets. What seemed like harmless negligence was actually a huge breach of data. The USB stick had 76 folders...
View ArticleApvera in Frost & Sullivan Article: Key takeaways from CyberConnect 360
Key takeaways from CyberConnect 360 Apvera – With growing concerns of insider threats on the rise, the Singapore-based startup seeks to help organizations deliver insights into behavior patterns that...
View ArticleApvera Mentioned as a Member of the Daimler Program
Startup Autobahn Singapore, a Mercedes-Benz-backed accelerator that focuses on automotive-related businesses, today announced the addition of two new partners: the Southeast Asian infrastructure...
View ArticleThe Need to Protect Your Data Without Allowing Access to Sensitive Data
The U.S. Department of Homeland Security recently banned Kaspersky from being installed on any of their computers. The reason cited was that Kaspersky was snooping private files from computers and...
View ArticleThe Nasty Future of Ransomware: Four Ways the Nightmare is about to Get Even...
It’s no mystery that ransomware is one of the biggest concerns for cyber security, but it’s still mainly underestimated. Until an enterprise organization experiences just how devastating ransomware can...
View ArticleCyber Security in the Aviation Industry
Why is Cyber Security important to the aviation industry? The global aviation system’s safety and security is vulnerable to attacks on its information and data systems. Nowadays hackers, cyber...
View ArticleThese 3 Departments are Causing the Biggest Cybersecurity Problems at Your...
While phishing and malware attacks can come at all levels, some departments are more susceptible than others. These departments cause the biggest cybersecurity problems, because they are usually given...
View ArticleWhat Is Cyber Insurance and Should You Get It?
You probably have insurance for your car, home, even life insurance. What you probably don’t have is cyber security insurance. We insure most of our tangible assets against possible loss, but most...
View Article