Japan defense Ministry denies cyberattack on Military Computer Network
Japan has specifically denied media reports which claimed that the nation’s Military Computer Network came under high-level cyber attack in September this year. The...
Ransomware+: A New Shade of Evil
Ransomware has become an ever growing topic of conversation and concern in the security community during the last several years. According to the ZDNet...
If You’re Only as Strong as Your Allies, Should You Trust Third-Party Code?
Jim Ivers wrote an interesting post about If You're Only as Strong as Your Allies, Should You Trust Third-Party Code? that I would like to...
Ransomware attack makes SF Transit passengers travel free
SF Muni Subway passengers were allowed to travel free on Friday last week, due to a ransomware attack on the transit systems servers, workstations,...
How Cloud can help SMBs overcome IT security Concerns
UK’s security breaches survey has proved that more than 74 percent of small and medium scale businesses located around the world struggle with the...
Three Proven Techniques for Detecting Targeted Attacks
Carl Manion wrote an interesting post about Three Proven Techniques for Detecting Targeted Attacks that I would like to share.
"Thanks to extensive media coverage of...
Where does Salesforce platform encryption fall short?
Mike Schuricht wrote an interesting post about Where does Salesforce platform encryption fall short? that I would like to share.
"Salesforce Shield (Salesforce’s platform encryption product) has...
Locky ransomware reportedly spreading on Facebook Messenger via JPG file
Very recently, it was reported that a piece of malware was spreading on Facebook, which exploited an image file to install malware. Today, a...
DDoS attack disrupts European Commission network
Distributed Denial of Services (DDoS) attack has disrupted the operations of European Commission on Thursday this week. As per our sources, the cyber attack...
Critical US Navy information spilled in Cyber Attack
Cyber criminals have succeeded in gaining access to the social security numbers and other sensitive information of more than 134,000 US navy personnel’s. The...
MOST POPULAR
How to Quickly Recover After a Third-Party Data Breach
I write all the time about how to prevent ransomware attacks and how the root cause in so many cases is an improperly secured...