The security breach that hit Uber last week was the work of Lapsus$.Uber said it is in close coordination with the FBI and US Justice Department on the matter. Lapsus$ is a South American hacking group has attacked a number of technology giants in the past year, including Microsoft, Samsung, and Okta. What Happened? An Uber EXT contractor had […]
Microsoft rolls out a new security feature that should significantly slow down password attacks against Windows devices.The latest preview of Windows 11 ships with the SMB server authentication rate limiter on by default. This makes Windows 11″a very unattractive target” for hackers trying to steal credentials, since it’s much more time-consuming for them to target […]
One of the key components of global trade is also one of the most vulnerable to cyber security threats, which is why cyber security awareness is so important. Global supply chains rely on the smooth running of shipping and ports, but maritime cybersecurity is too often a low priority. Since the whole industry is reliant […]
The Importance of Data Security Data backup and recovery is the process of creating and storing copies of data that can be used to protect your organization against data loss, it’s a necessary safety net for businesses today. Data is one of the most valuable assets a business has and often holds the key to a competitive advantage in the […]
Gmail is used by millions of people around the globe. As of July, 28.13% of people use Gmail as their primary email client. Regularly, users have to send sensitive information to others. A few years back Google added a nice feature to Gmail called Confidential Mode that helps protect sensitive information from authorized access. With Confidential […]
Here’s what to look Forward to, and to Fear, in the next Evolution of the Global Internet. In reality the internet was in many respects a lucky accident. It originated through a collection of US Government technology projects, that somehow grew into a global network. Early enthusiasts envisioned the internet as a free and open […]
A stealthy new form of malware is targeting Linux systems in attacks that can take full control of infected devices, and use this access to install crypto-mining malware. This malware has been detailed by cybersecurity researchers at AT&T Alien Labs, they call it Shikitega. This malware targets endpoints and Internet of Things devices that run on Linux operating […]
Those of you who use Microsoft Edge want to make sure that your security is as tight as possible.Edge offers several options to help protect you from malicious websites and other online hazards. A SmartScreen option will protect you from malicious websites and files. An option for potentially unwanted apps blocks downloads of suspicious or […]
Targets of ransomware rarely publicly acknowledge attacks. More openness would help everyone. Ransomware is one of the most significant cybersecurity issues we face, as cyber criminals hack into businesses, schools, hospitals, critical infrastructure and more, in order to encrypt files and demand a ransom payment for the decryption key. Despite warnings not to, many victims pay […]