Anyone who owns a mobile phone likely understands at this point that their device’s location can be tracked in real time in any number of different ways. Carriers, advertisers, Google, Apple, and other companies all have a highly accurate picture of where a device is at any given time. That’s part of the devil’s bargain we’ve all made in order to have space phones in our pockets.
The Industry’s Only SaaS-Delivered Enterprise DLP
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
No-Compromise Data Protection is:
- Cross Platform
- Flexible Controls
The Shadow Brokers' new offering of a monthly exploit subscription service poses a threat to just about everyone.
Like PKI and Linux on the desktop in the last decade, it seems as though biometrics have become this decade’s promising technology that never really fully delivers on its promise.
The WannaCry ransomware outbreak that emerged last week and is exploiting a vulnerability discovered and hidden for an unknown amount of time by the NSA is arguably the worst ransomware we’ve seen thus far. It’s not just encrypting files and locking users out of their machines, but it’s also self-propagating and uses exploit code, behavior that hasn’t been seen in ransomware until now.
Just by the nature of its dominant position on the network, Google has as much power as almost any organization to influence the security of the web. The company has used that power in a variety of ways over the years, from providing its Safe Browsing API to other browser vendors to making SSL the default connection for its search, email, and other services.
The IoT landscape is becoming a battleground for all manner of malware, with some variants fighting for control of infected devices and authors racing to get their creations onto as many devices as possible.
Researchers have uncovered a new worm that is infecting thousands of IoT devices and trying to take the Mirai botnet’s corner.
Botnets have been a serious problem on the web for more than 15 years, and as the network has changed, botnet operators have had to adapt in order to continue making money. While launching DDoS attacks on demand once was the main revenue stream for these cybercriminals, things have changed in recent years to include the paid installation of ransomware, banking trojans, and other types of malware.
Congress kicked consumer privacy right in the teeth this week with the vote to allow broadband Internet providers to sell customers’ data without consent. The decision rolls back a key rule implemented just a few months ago by the FCC and sends a clear signal that in Washington, now more than ever, money talks.
It has been two months since Donald Trump took office, and the president has been pretty busy. There has been quite a lot of signing and ordering and order signing and policy making. But what there has not been is much movement on the cybersecurity front.