/ Security News /

As cyberattacks continue to proliferate in volume and increase in sophistication, many organizations acknowledge that some part of their breach protection must be outsourced, introducing a million-dollar question of what type of service to choose form. Today, Cynet releases the Security Outsourcing Guide (download here), providing IT Security executives with clear and actionable guidance on …

/ Security News /

Fair elections are the lifelines of democracy, but in recent years election hacking has become a hot topic worldwide. Whether it’s American voting machines during the 2016 presidential election or India’s EVMs during 2014 general elections, the integrity, transparency, and security of electronic voting machines remained questionable, leaving a wound in the minds of many …

/ Security News /

German police are seeking your help in gathering information related to a MAC address that could lead to the cell phone device used by a DHL blackmailer who last year parceled out bombs at different addresses in Brandenburg and Berlin. Between November 2017 and April 2018, someone used German parcel delivery service DHL to sent …

/ Security News /

Here we have great news for all bug bounty hunters. Now you can get paid up to $40,000 for finding and responsibly reporting critical vulnerabilities in the websites and mobile applications owned by Facebook that could allow cyber attackers to take over user accounts. In the latest post published Tuesday on the Facebook page, the …

/ Security News /

Microsoft today launched a new bug bounty program for bug hunters and researchers finding security vulnerabilities in its “identity services.” Hacking into networks and stealing data have become common and easier than ever but not all data holds the same business value or carries the same risk. Since new security today depends on the collaborative …

/ Security News /

Video: Finding practical ways to communicate cybersecurity best practices – TechRepublic Video: Finding practical ways to communicate cybersecurity best practices Greg Michaelidis, Cybersecurity Fellow at the New America Foundation and former Obama Senior Advisor for Public Affairs, explains why America’s cybersecurity posture is dangerous and how companies can protect users from cyberattacks. Video: Finding practical …

/ Security Assessments News /

Enlarge (credit: S-8500) The WCry ransomware worm has struck again, this time prompting Honda Company to halt production in one of its Japan-based factories after finding infections in a broad swath of its computer networks, according to media reports. The automaker shut down its Sayama plant northwest of Tokyo on Monday after finding that WCry …

/ Security Assessments News /

Racks of servers that populate Apple’s $1 billion data center in Maiden, North Carolina. Image courtesy of Apple Inc. A mid-2016 security incident led to Apple purging its data centers of servers built by Supermicro, including returning recently purchased systems, according to a report by The Information. Malware-infected firmware was reportedly detected in an internal …