X

Tag: Featured Articles

Magecart hits hundreds of websites via ad supply chain hijack

A criminal Magecart gang successfully compromised hundreds of ecommerce websites via a malicious script that silently harvested personal data and payment card information as customers bought goods and services online. The post ...

What You Need to Know About Secure Mobile Messaging in Healthcare

With the majority of people using smartphones these days, texting is all but a given when trying to communicate with your friends or family. But what about your doctor? A recent study ...
The Top 5 Vendor-Neutral Cloud Security Certifications of 2019

The Top 5 Vendor-Neutral Cloud Security Certifications of 2019

Many organizations migrate to the cloud because of increased efficiency, data space, scalability, speed and other benefits. But cloud computing comes with its own security threats. To address these challenges, companies should ...
Reddit users locked out of accounts after “security concern”

Reddit users locked out of accounts after “security concern”

A large number of Reddit users are being told that they will have to reset their passwords in order to regain access to their accounts following what the site is calling a ...

How Cybercriminals Are Getting Initial Access into Your System

This article covers the main techniques cybercriminals use at the initial stage of attacks against enterprise networks. There are several dangerous phases of cyberattacks targeting the corporate segment. The first one encountered ...
Opinion: Back to the Start for 2FA Adoption?

Opinion: Back to the Start for 2FA Adoption?

In a previous post, Tripwire asked contributors what their most memorable event of 2018 was. As a follow-up, guest author Bob Covello expands on his thoughts about two-factor authentication (2FA). We in ...

What Keeps You Up At Night?

Maybe you have nightmares about accidentally posting AWS console credentials on Github. Some CISOs undoubtedly have dreams where they must explain to the board that the company has just set the record ...

Limitations of Blockchain Technology

The elephant in the room is the viability and sustainability of blockchain technology. Cryptocurrency mining, for instance, requires specialized rigs that consume electricity. In certain estimates, at the time of writing, the ...
Hackers demand ransom from Dublin’s tram system, after Luas website defaced

Hackers demand ransom from Dublin’s tram system, after Luas website defaced

The website of Luas, the tram system operating in Ireland's capital city of Dublin, has been taken offline this morning after hackers defaced the site and demanded a ransom be paid within ...

Deploying Blockchain and Smart Contract based Solutions

| | Featured Articles
As discussed before, the blockchain-based solution is built to provide strong integrity and independent verifiability. An exception to the independent verifiability is private blockchain solutions. In this part, we discuss both of ...
Loading...