New Treacherous Tricks of Ransomware Authors
Ransomware operators are giving their sketchy repertoire an overhaul. These attacks used to be about unauthorized data encryption and now they are adding data theft to the mix. As a result, not only do the criminals hold the victims’ files for ransom, but they also threaten to leak sensitive information ... Read More
Blockchain Vulnerabilities: Imperfections of the Perfect System
The whole cryptocurrency and blockchain craze has attracted both fans and critics of the new tech, but the flip side is that it has lured cybercrooks, too. After Bitcoin prices reached the... Go on to the site to read the full article ... Read More
The Main Concerns with Biometric Authentication
Part of my job is to coordinate technical specifications for mobile app development projects with the customers. In the process, I often hear the same question: can we authenticate with the... Go on to the site to read the full article ... Read More
Getting Paid for Breaking Things: The Fundamentals of Bug Bounty
According to the latest Software Fail Watch report released by Tricentis, companies all over the world lost $1,7 trillion last year over software failures and vulnerabilities. Such tremendous losses... Go on to the site to read the full article ... Read More
Identity Governance and Administration (IGA) in IT Infrastructure of Today
Identity Governance and Administration (IGA) can be considered a very important area in the management of information technology in enterprises and organizations. The level of IGA importance can be... Go on to the site to read the full article ... Read More
And Again, About Storing Passwords
When the question of storing passwords arise, the first idea is to simply keep them in clear text in the corresponding table in the database. However, in 2018 cybercriminals are very good at getting... Go on to the site to read the full article ... Read More
Personally Identifiable Information and Distributed Ledgers
PII (personally identifiable information) is a valuable component of every individual’s life. Governments and organizations take significant efforts to protect this data on the local and... Go on to the site to read the full article ... Read More
Top Threats to Online Voting from a Cybersecurity Perspective
Last year, NASA set up an online voting campaign to pick a name for an astronomical object, a small ice-covered asteroid roving through a remote part of the Solar system. Although the New Horizons... Go on to the site to read the full article ... Read More
What Is an IdM and How to Discover If You Need One
IdM is an abbreviation for “Identity Management,” i.e., management of user accounts. Let’s turn to Wikipedia: “IdM is the security discipline that enables the right... Go on to the site to read the full article ... Read More
10 Tips to Increase IoT Cameras Protection
From various security reports on IoT botnets, we know that most digital video surveillance systems used by small and medium-sized businesses contain vulnerabilities and can be hacked. This article... Go on to the site to read the full article ... Read More

