Research: More Worries with Wasm

Research: More Worries with Wasm

WebAssembly is taking over execution tasks that were once the domain of JavaScript. Now Wasm is used increasingly for malicious purposes, research shows ... Read More
Why is iOS 12 a top choice for app developers when it comes to security

Why is iOS 12 a top choice for app developers when it comes to security

When it comes to mobile operating systems, iOS 12 is generally considered to be one of the most secure — if not the leader — in mobile security. It’s now a little more than a year old, and its features may be a bit overshadowed by the launch of iOS ... Read More
JavaScript: How NPM Maintainer Accounts Amplify Risk

JavaScript: How NPM Maintainer Accounts Amplify Risk

Attackers need to target only 20 specific maintainer accounts to reach more than half of the entire JavaScript npm ecosystem, security researchers warn. What's the cybersecurity impact for the digital supply chain? ... Read More
Businesses are confident in their cybersecurity efforts, but weaknesses prevail

Businesses are confident in their cybersecurity efforts, but weaknesses prevail

Today, maintaining data integrity and network security is a primary challenge for businesses everywhere. The scale of the threats they face is enormous. Those that succeed go unheralded. Those that fail end up in the headlines. Despite the risks, a shocking number of security decision-makers seem confident that their companies ... Read More
The state of the Cybersecurity skills gap heading into 2020

The state of the Cybersecurity skills gap heading into 2020

Just this year, several high-profile cyber breaches exposed confidential information and resulted in millions of dollars in damages. Cybersecurity is more important than ever — a big problem for employers facing millions of unfilled cybersecurity positions and a shortage of talented workers. As for the exact number of openings, the ... Read More
6 Tips to Prevent Social Engineering

6 Tips to Prevent Social Engineering

Social engineering is a tactic where the attacker influences the victim to obtain valuable information. Office employees are targeted to reveal confidential data about a corporation while non-specialists can come under the radar to disclose their credit card information. One might also be threatened that the attacker will hack/his her ... Read More
How to Secure Your Content Management System (CMS)

How to Secure Your Content Management System (CMS)

The cybersecurity weaknesses of Content Management Systems make online attacks easy and likely. How to improve CMS security in the enterprise? ... Read More
What is a Magecart attack, and how can you protect your business?

What is a Magecart attack, and how can you protect your business?

Recently, British Airways was slapped with a $230M fine after attackers stole data from hundreds of thousands of its customers in a massive breach. The fine, the result of a GDPR prosecution, was issued after a 2018 Magecart attack. Attackers were able to insert around 22 lines of code into ... Read More
A cybersecurity primer for mid sized businesses

A cybersecurity primer for mid sized businesses

The decision to which information security measures should be used across the company’s IT infrastructure and which ones should be left out may be a tough one for midsized companies. The financial resources of a midsized company cannot allow applying all the existing cybersecurity elements to protect the network. At ... Read More
3 cybersecurity lessons for e-commerce website administrators

3 cybersecurity lessons for e-commerce website administrators

In large part, the security of an ecommerce company is the responsibility of its technical support team and ecommerce software vendors. In reality, cybercriminals often exploit the security illiteracy of the staff to hit a company. Of all the ecommerce team, web administrators are often targeted for hacker attacks as ... Read More
Loading...