A new study from Google found 12 million sets of credentials on black markets that had been stolen through phishing.
The Industry’s Only SaaS-Delivered Enterprise DLP
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
No-Compromise Data Protection is:
- Cross Platform
- Flexible Controls
Google recently announced it will begin offering a higher level of security for high-risk users.
A new IoT botnet, IoT Reaper, has compromised more than one million devices, including IP cameras and home routers.
Researchers have found that RSA keys generated by cryptographic chips can be factored, exposing a vulnerability affecting the security of many systems and users.
If you’re an iPhone user, you’re likely well acquainted with the system dialog boxes that iOS spits out on a regular basis, asking for our Apple ID password. It happens on a fairly regular basis, when you’re installing new apps or iOS updates or when you’ve been signed out for some reason. But it’s incredibly simple for non-Apple apps to produce the exact same dialog boxes and collect users’ credentials, making for a potentially highly effective phishing tool.
The Equifax data breach—one of the largest breaches ever made public—has the potential to be the catalyst for a major change in the way that courts look at the damage that data breaches cause to victims.
Surveillance cameras are an omnipresent part of modern life. The constant presence of government and private watchers imagined by George Orwell more than 60 years ago is not only here, it’s much worse than even he could have conceived.
There are few companies in the tech industry that have a better sense of what consumers want—and are willing to pay premiums for—than Apple. Often, it seems Apple’s marketers and engineers know more about our product desires than we do, and the company is quite adept at satisfying those wants.
A group of attackers with suspected ties to the Russian government has been conducting a long-term campaign that has penetrated the networks of energy providers in both the United States and Europe, giving them access to vital systems and the potential ability to cause power disruptions at their leisure.
A collaborative effort among more than half a dozen security and technology companies has disrupted a botnet that was attacking content providers and content delivery networks with compromised Android devices.