Ransomware

New Treacherous Tricks of Ransomware Authors

Ransomware operators are giving their sketchy repertoire an overhaul. These attacks used to be about unauthorized data encryption and now they are adding data theft to the mix. As a result, not only do the criminals hold the victims’ files for ransom, but they also threaten to leak sensitive information ... Read More
Security Boulevard

Blockchain Vulnerabilities: Imperfections of the Perfect System

| | General Security
The whole cryptocurrency and blockchain craze has attracted both fans and critics of the new tech, but the flip side is that it has lured cybercrooks, too. After Bitcoin prices reached the... Go on to the site to read the full article ... Read More

The Main Concerns with Biometric Authentication

| | General Security
Part of my job is to coordinate technical specifications for mobile app development projects with the customers. In the process, I often hear the same question: can we authenticate with the... Go on to the site to read the full article ... Read More

Getting Paid for Breaking Things: The Fundamentals of Bug Bounty

| | Hacking
According to the latest Software Fail Watch report released by Tricentis, companies all over the world lost $1,7 trillion last year over software failures and vulnerabilities. Such tremendous losses... Go on to the site to read the full article ... Read More

Identity Governance and Administration (IGA) in IT Infrastructure of Today

Identity Governance and Administration (IGA) can be considered a very important area in the management of information technology in enterprises and organizations. The level of IGA importance can be... Go on to the site to read the full article ... Read More

And Again, About Storing Passwords

| | General Security
When the question of storing passwords arise, the first idea is to simply keep them in clear text in the corresponding table in the database. However, in 2018 cybercriminals are very good at getting... Go on to the site to read the full article ... Read More

Personally Identifiable Information and Distributed Ledgers

| | General Security
PII (personally identifiable information) is a valuable component of every individual’s life. Governments and organizations take significant efforts to protect this data on the local and... Go on to the site to read the full article ... Read More

Top Threats to Online Voting from a Cybersecurity Perspective

Last year, NASA set up an online voting campaign to pick a name for an astronomical object, a small ice-covered asteroid roving through a remote part of the Solar system. Although the New Horizons... Go on to the site to read the full article ... Read More

What Is an IdM and How to Discover If You Need One

IdM is an abbreviation for “Identity Management,” i.e., management of user accounts. Let’s turn to Wikipedia: “IdM is the security discipline that enables the right... Go on to the site to read the full article ... Read More

10 Tips to Increase IoT Cameras Protection

From various security reports on IoT botnets, we know that most digital video surveillance systems used by small and medium-sized businesses contain vulnerabilities and can be hacked. This article... Go on to the site to read the full article ... Read More