So your third party has been breached…

Another day, another third party security compromise story… this time it is Indian outsourcing giant Wipro. The firm has confirmed ...
Radware's 2019 Hacker's Almanac

Here’s How You Can Better Mitigate a Cyberattack

Where does the attack landscape lead us into 2020? No one knows for sure, but strong indicators help Radware build logic chains to better forecast where the state of network security is ...

Bad biometrics: Samsung’s new S10 phone

When biometrics work properly, they can provide you with an easy to use security solution with a reasonable level of ...
How Hackable Is Your Dating App?

How Hackable Is Your Dating App?

If you’re looking to find a date in 2019, you’re in luck. Dozens of apps and sites exist for this sole purpose – Bumble, Tinder, OKCupid, Match, to name a few. Your ...
5 Things Impacting Security in 2019

5 Things Impacting Security in 2019

As technology advancement continues at a break neck speed, what can we expect in 2019? More of the same. In particular watch for the following trends that impact security to occur: The ...
Here’s Why Foreign Intelligence Agencies Want Your Data

Here’s Why Foreign Intelligence Agencies Want Your Data

The implications of the recent Marriott hack go far beyond those of your average data breach. This megabreach of 383M records doesn’t just compromise sensitive data for the sake of fraud or ...
2018 In Review: Schools Under Attack

2018 In Review: Schools Under Attack

As adoption of education technologies expanded in 2018, school networks were increasingly targeted by ransomware, data theft and denial of service attacks; the FBI even issued an alert warning this September as ...
Cybersecurity as a Selling Point: Retailers Take Note

Cybersecurity as a Selling Point: Retailers Take Note

UK-based retailers were no strangers to data breaches in 2018. In June, Dixons Carphone announced a breach of 5.9 million customer bank card details and 1.2 million personal data records, and the ...

Preventing Man-in-the-Middle Attacks

When it comes to cyber security, sometimes the jargon can feel overwhelming. Ransomware, encryption, man-in-the-middle attacks… The Vaporstream blog has covered ransomware and encryption in the past, so today I wanted to ...
Hey Criminals! Don't Trust Your Shady Encryption Providers

Hey Criminals! Don’t Trust Your Shady Encryption Providers

| | hacks, news reaction
Given the technical bugs in IronChat's application, it already throws red flags as an insecure tool for use by a clandestine organization ...
Loading...