Forrester also called out the work-from-anywhere trend as a major threat in 2022. It explained that an anywhere-work model presents an opportunity to create new kinds of sensitive data.

IT security firm NeoSystems last week announced it would host a panel of experts from the private and public sectors Tuesday centered around the cybersecurity implications of the ongoing conflict in Ukraine. TechNewsWorld sat in on the Zoom-delivered panel discussion.

SPOTLIGHT ON SECURITY

Beware the Ides of March Madness

This annual event is a most-popular time for betting pools and bracket challenges -- when employees often use websites, online platforms, or shared spreadsheets to organize. Hackers have countless ways to entice you to engage with them. These ruses include the promise of bigger winnings or insider i...

Internal documents recently leaked by a member of the Conti ransomware group reveal the gang's status as a multi-layered business organization. These chat logs present a deep dive into the gang's revenue numbers, leaders, recruiting practices and operations, and victims.

Brace yourself, 2022 promises to bring expanded cyber confrontations as ransomware attacks gain the high ground. A dangerous increase in ransomware attacks last year caused devastating compromises to government organizations, critical infrastructure, and businesses. Much of the increase resulted fro...

The biggest breach of the period was actually a combination of several cyber smash-and-grab operations over the years that contained 3.2 billion unique email and password combinations from Netflix, LinkedIn and other online outfits.

Russian authorities on Friday reported that they shut down the REvil ransomware operations and arrested a dozen or more gang members. The Federal Security Service of the Russian Federation said it quashed the REvil ransomware gang after U.S. authorities reported on the leader.

Cybercriminals in 2022 will move from identity theft to identity fraud, predicted the Identity Theft Resource Center. Bad actors are accumulating personal identifying information, but they're not using it to target consumers as much as they used to do. Rather, they're using it in credential attacks ...

This nasty software bug has much of the IT world in a panic as it follows us into the New Year. No doubt, many organizations and SMBs with no IT staff are clueless about its existence. But ignorance of Log4j only makes them more susceptible to an attack. They remain defenseless.

The Finland-based security consultancy discovered vulnerabilities affecting over 150 different HP multifunction printer products. Attackers can exploit the flaws to seize control of devices, steal information, and further infiltrate networks to inflict other types of damage, according to F-Secure's ...

'Tis the season to go phishing. Nothing brings out digital bandits like the holidays, and this year is no exception. Proofpoint, an enterprise digital security company, reports its researchers are seeing a massive global increase in holiday-themed mobile phishing attacks, a.k.a. smishing. It noted t...

Over the last year, ethical hackers have prevented more than US$27 billion in cybercrime, according to a report by a leading bug bounty platform. In its annual Inside the Mind of a Hacker report, Bugcrowd maintained that ethical hackers working on its platform were able to prevent those cybercrime l...

OPINION

The Dilithium Crystals Might Be Melting

For those born after the mini-computer era (co-terminus with the original Star Trek), dilithium is the fuel used to power a warp core propulsion system needed for interstellar travel. Dilithium is both naturally occurring and rare, and when it melts, from overuse of the warp core, the starship is ba...

A new fraud ring called Proxy Phantom is using sophisticated credential stuffing attack methods to take over customer accounts for U.S.-based e-commerce merchants. The latest research from digital trust and safety firm Sift demonstrates fraudsters' relentless innovation and reinforces retailers' nee...

Which review ratings influence your decision to purchase a product or service?
- select any that apply -
Loading ... Loading ...

E-Commerce Times Channels