Posts in tag

Cybersecurity


HP Inc. (NYSE: HPQ) released its new Quarterly Threat Insights Report, providing analysis of real-world attacks against customers worldwide. The report found that 29% of malware captured was previously unknown* – due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection. 88% of malware was delivered by email into …

We are in a unique position as 2021 gets underway. With the coronavirus pandemic still very much a factor, cybersecurity priorities have shifted dramatically in the last twelve months, with an increased focus on distributed workforces and the technologies that support them. Risk comes from all angles, with users, vendors, partners, and systems all contributing …

Whether it’s turkey and stuffing for U.S. Thanksgiving, jiao zi to celebrate the Chinese New Year, or mithai for Diwali – holidays typically mean food. The way your food gets from the farm to your fork is changing – and technology is playing a vital role. Robots are already taking orders in burger joints, social …

IBM Security launched a new service that allows companies to experiment with fully homomorphic encryption (FHE) – an emerging technology designed to allow data to remain encrypted even while being processed or analyzed in cloud or third-party environments. The new IBM Security Homomorphic Encryption Services provide companies with education, expert support, and a testing environment …

PhoenixNAP®, a global IT services provider offering security-focused cloud infrastructure, dedicated servers, colocation, and specialized Infrastructure-as-a-Service (IaaS) technology solutions, announced collaboration with Sagenext, a US-based tax and accounting software hosting provider. The company leverages phoenixNAP’s dedicated server platform to provide specialized application hosting solutions to businesses looking to move their tax and accounting software to …

Rackspace Technology™, a leading end-to-end multicloud technology solutions company, will co-sponsor The New Cybersecurity Landscape virtual event with Armor® on October 7th at 10:00 am CT as part of the company’s Solve Strategy Series. From Zoom bombing to account takeovers, through access mining and phishing, the event will shed light on emerging security threats and empower viewers with …

IBM Security announced a new risk-based service designed to help organizations apply the same analytics used for traditional business decisions to cybersecurity spending priorities. IBM’s new Risk Quantification Services creates risk assessments to help clients identify, prioritize and quantify security risk as they weigh decisions such as deploying new technologies, making investments in their business …

Nowadays, manufacturers can connect their devices to the Alexa voice speaker system or integrate Amazon’s assistant directly into their products. This integration requires that their devices undergo a series of tests to validate that they meet all of Amazon’s requirements, including new cybersecurity requirements (secure booting, hardware encryption, key storage, privileges, etc.). To this end, …

The CERT at Retarus has issued a warning regarding phishing emails in which recipients are instructed to edit important business partner contracts. The phishers pretend to make the document available on the otherwise reputable Dotloop platform, directing the recipients to a fake login page for their Microsoft account. The fraudulent emails bear the Microsoft logo as …

Watch out, these applications have vulnerabilities with the highest share of exploits used by cybercriminals. Microsoft Office Suite, Android applications, and browsers are the three most common targets of cybercriminals during cyber attacks, according to the latest analysis of the AO Kaspersky Lab which was conducted for Q3 2019. These three accounts for 95.41% of …