No More PowerPoints - Simplify your PR and Marketing Reporting >> Learn How
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Equifax Breach, DU Data Siphon

Equifax Discloses Earlier Cybersecurity Incident, But No Details

“March breach is still shaded with uncertainty”

Equifax Inc. hired cybersecurity experts to deal with an incident on its corporate networks in March, two months before the massive hack began that it has said led to the potential compromise of personal data belonging to 143 million U.S. consumers.

Infrared signals in surveillance cameras let malware jump network air gaps

“Many networks disconnected as precaution”

Researchers have been successful in creating malware that can jump airgaps by using the infrared capabilities of an infected network’s surveillance cameras to transmit data to and from attackers. The malware prototype could be a crucial ingredient for attacks that target some of the world’s most sensitive networks that were previously thought to be safe. Militaries, energy producers, and other critical infrastructure providers frequently disconnect such networks from the Internet as a precaution.

Chinese Mobile Antivirus App Caught Siphoning User Data

“Secret data theft”

Google has removed, and then reinstated, one of the most popular mobile antivirus apps on the Play Store. The move was taken after security firm Check Point discovered that DU Antivirus Security, created by the DU Group, was secretly collecting device data from users’ smartphones. Over 10 million downloads occurred without proper security precautions.

Enterprise IT security planning: Five ways to build a better strategy

“Helpful tips for a competent defense”

Those buzzwords recommended for building a successful digital business, such as flexibility, agility and openness, don’t always fit nicely with more sober requirements like the needs of a corporate security policy. So, how can IT leaders create an approach to information security that is fit for the modern business? ZDNet speaks to five experts about the key issues CIOs face.

  1. Make cybersecurity your number one priority
  2. Understand the importance of making a commitment
  3. Embed a culture of risk management across the business
  4. Apply measures that are fit for the open world
  5. Create a long-term strategy for system integrity

Enjoy your read? Check out our other content here.

Leave a Reply

Your email address will not be published. Required fields are marked *

MSIRobot