I usually endeavor to separate my political activities and my cybersecurity and digital rights advocacy, except for cases in which they are inextricably connected. You can say that everything is connected, of course, and that is true, but y…
Since we last wrote about Payment Card Industry Data Security Standards (PCI DSS), the organization has made a series of updates to its standards with its latest version 4.0. It contains several important improvements, which we’ll break dow…
Some researchers, business specialists, and forecasters believe the metaverse – the virtual reality platform accessed by devices like Meta’s Oculus Quest 2 – will reach the same popularity and generate the same revenue as the internet. Bloo…
Private data could be collected from thousands of Android and iOS apps via Yandex, the leading search engine in Russia, according to security researchers. The issue revolves around how this data might be available to Russia state agencies. …
Malware group FIN7 is once again on the move, leveraging software supply chains, remote program execution methods, and stolen credentials to deliver ransomware to enterprise networks. The group has been around since at least 2015. Initially…
Germany’s Federal Criminal Police Office and Central Office for Combating Cybercrime announced this week that they confiscated the Hydra server infrastructure after extensive investigations into the cybercrime forum since August 2021. The s…
Security researchers have uncovered a new series of threats that are targeting uninterrupted power supply (UPS) units. These threats can result in malware attacking the computers connected to the same networks through a variety of clever me…
Security researchers have uncovered a new series of threats that are targeting uninterrupted power supply (UPS) units. These threats can result in malware attacking the computers connected to the same networks through a variety of clever me…
Cyber strategist Pete Lindstrom maintained in an article on CSO that cybersecurity risk is constantly changing in a way analogous to the probability odds in a March Madness tournament. Observing the constant data-analysis on the 538 March M…
Before you download another application from the more than three million that are in the Google Play Store, read on to learn a few simple things you can do to protect yourself. Before we get into that, let’s establish why this is worthwhile…