Cybersecurity - Topic - Digital Journal
Email
Password
Remember meForgot password?
    Log in with Twitter

Cybersecurity News

Twitter’s hack causes a stir in the cybersecurity community Special

The extent of the Twitter hack has caused consternation within the cybersecurity community over its extent and ease of operation. Naturally, those impacted are also feeling vulnerable. This means it is important to boost security.

SAP's critical bug allows unrestricted access to ERP Special

SAP has patched a critical vulnerability impacting the LM Configuration Wizard component in NetWeaver Application Server (AS) Java platform. This potentially impacted on enterprise resource management (ERP) systems.

Q&A: Consumer sentiment trends as businesses open back up Special

Consumer sentiment improved as businesses emerged from the lockdown and looked to open back up. But with some areas shifting back to business restrictions, sentiment has dipped slightly, as trend data reveals.

Why enterprises should not over rely on AI for cybersecurity Special

AI is a strong tool for cybersecurity, but it is not the silver bullet. Many enterprises must not overly rely on it for their security, or they could be setting themselves up for problems. This is particularly so for the finance sector.

V Shred exposes 1 million files with open S3 bucket Special

It has been revealed that fitness brand V Shred left the information thousands of customers on a completely unsecured AWS S3 bucket. V Shred have addressed the issue; however, there are concerns about the content of the exposed data.

Big six banks are using Confirmation of Payee to reduce APP scams Special

The Payment Systems Regulator has said all members of the UK’s six largest banking groups are now using the new fraud prevention tool, Confirmation of Payee, helping to reduce ised Push Payment (APP) scams. What does this mean for consumers?

Too few people are concerned about working-from-扑克王游戏下载home security

A new survey finds that only a low number of U.S. citizens - 31 percent - are concerned about working-from-扑克王游戏下载home data security. Such concerns are important, given the increased application of remote working during COVID-19.

How the NCSC cam to catch a million phishing emails Special

The NCSC's Suspicious Email Reporting Service has received a million suspicious email reports from the public just two months after launching. This highlights the risks facing society.

Looking back at the NotPetya cyber attack anniversary Special

Three years on from a major global cyberattack, there remain lessons to be considered from the NotPetya cyber attack, according to David Grout, CTO EMEA at FireEye.

Cybersecurity and 75th anniversary of the UN charter Special

June 26th marks the 75th anniversary of the United Nations. The formation of the UN has probably led to a lowering of military conflict. How can it handle conflict moving into cyberspace?

Vulnerability discovered in IBM Maximo software

Positive Technologies experts have discovered a vulnerability in IBM’s Maximo Asset Management software. The weakness could have had serious implications for a range of different businesses, including major corporations.

Security weaknesses behind the Australian cyberattacks Special

Australia has experienced a major state-based cyber attack, affecting all levels of government as well as essential services and businesses. Tim Wellsmore, Mandiant Government Solutions looks at the lessons.

Babylon Health hit by major data breach Special

Digital health provider Babylon Health acknowledged that its video appointment application, aimed at general practitioners, suffered a data breach. The issue raises some concerns for telehealth.

Expert says new Ripple20 bugs underscore need for action Special

New research revealing the Ripple20 bugs that impact hundreds of millions of IoT device - from printers to insulin pumps to power grids - underscores the need to put pressure on device manufacturers to take security more seriously.

What businesses need to do for CCPA implementation Special

California Consumer Privacy Act (CCPA) implementation begins in July 2020 and many businesses need to face up to the implications and put appropriate systems in place, says Cindy Provin of nCipher Security.

Claire's Magecart hit is a serious cyber attack Special

Hackers have successfully breached the websites of the U.S. accessory giant Claire’s, plus a subsidiary company called Icing. Through this, they have gained access to customer credit card data. This represents a significant retail issue.

South African bank must replace 12M customer cards Special

The banking division of South Africa's Post Office called Postbank lost over $3.2 million will have to replace more than 12 million customer cards. This followed a cybersecurity incident.

FT: Hackers for hire ‘targeted hundreds of institutions’ Special

It has been revealed that a hackers-for-hire group dubbed “Dark Basin” has targeted thousands of individuals and hundreds of institutions around the world.

Knoxville, Tennessee hit with ransomware attack Special

Knoxville - Knoxville, Tennessee was hit with a ransomware attack that took place between June 10 and June 11. In response to the attack, IT staff shut down affected servers and took down the city's network from online.

Q&A: Importance of fraud trends as businesses open up Special

As many businesses attempt to return to something resembling normalcy, some risks might be greater than they were before the shutdown. This includes cybersecurity and fraud issues. An expert presents some core advice.

Honda suffers 3rd cyberattack in 12 months Special

Global automotive manufacturer Honda revealed that a major cyberattack had completely halted several parts of its operations, including customer service and financial services.

FIN7 hacking group member arrested by the U.S. Special

U.S. officials have arrested an alleged member of the FIN7 hacking group (also known as the Carbanak Group) who have been involved in several high-profile cybersecurity incidences.

Bharat Interface for Money hit by major data breach Special

Bharat Interface for Money suffered a data breach that exposed the personal details of over 7 million users, including dates of birth, addresses, names and Ardaar cards.

COVID-19 and contact tracing: How safe is your data? Special

Contact tracing apps and the use of people employed to be 'tracers' is seen as an important aspect of the fight against coronavirus. However, what happens to the data and who controls it?

Key steps to take to keep remote workers secure Special

The demand for remote working as a result of COVID-19 has invariably placed pressures on organizations to ensure the availability of resources outside of corporate control. How secure is this process? Cindy Provin discusses with Digital Journal.

Improving cybersecurity through Multi-Factor Authentication

Recent reporting shows that Multi-Factor Authentication (MFA) can block up to 99.9 percent of automated cyber attacks, yet only 28 percent of the population (based on the report) take such measures to protect their accounts.

Quidd data breach exposes 4 million users, including youngsters Special

Quidd, an online marketplace for trading stickers, cards, toys, and other collectibles, has suffered a data breach and the details of 4 millions users have been exposed.

扑克王游戏下载home Chef involved in a significant data breach Special

扑克王游戏下载home Chef, a US-based meal kit and food delivery service, announced a data breach today after a hacker sold 8 million user records on a dark web marketplace.The user records for 扑克王游戏下载home Chef was one of the databases being sold.

Changing workplaces: User-focused attacks increasing Special

The fourth part of Digital Journal's conversations with experts about how COVID-19 is changing workplaces together with the security implications considers user-specific attacks.

Post-COVID-19 working: The end of passwords? Special

Many changes are afoot in the post-COVID-19 world, especially in relation to ways of working and with issues surrounding cybersecurity. In out second special feature, we hear from Robert Prigge.
  1 2 3 4 5 6 ... 20 Next»

Set up a news alert for

Cybersecurity


Cybersecurity Image

No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
NATO has two rapid reaction teams on standby  armed with fast computers with vulnerability-analysis ...
NATO has two rapid reaction teams on standby, armed with fast computers with vulnerability-analysis code, forensic software and special database management tools 
DAMIEN MEYER, AFP/File
File photo: IBM Security instructors at the company’s security business headquarters  simulate cyb...
File photo: IBM Security instructors at the company’s security business headquarters, simulate cyber attacks in the world’s first commercial cyber range at the IBM X-Force Command Center in Cambridge, Mass.
MIT and IBM Watson AI Research Lab (CC BY-ND 2.0)
Windows Defender Dofil cybersecurity response
Windows Defender Dofil cybersecurity response
Microsoft
Gregg Garrett is the Head of International Cybersecurity with BDO USA  LLP  one of the nation’s le...
Gregg Garrett is the Head of International Cybersecurity with BDO USA, LLP, one of the nation’s leading professional services organizations.
BDO USA
The tool s response to using  testpassword  as a password
The tool's response to using "testpassword" as a password
Anything connected to the internet -- from smartphones to power plant controllers -- can be manipula...
Anything connected to the internet -- from smartphones to power plant controllers -- can be manipulated, a Dutch military cyber official said
ODD ANDERSEN, AFP/File
Ryan Stolte  Co-founder and CTO of Bay Dynamics.
Ryan Stolte, Co-founder and CTO of Bay Dynamics.
Bay Dynamics
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple
Samy Kamkar s $5 Raspberry Pi Zero-based  PoisonTap  hacking tool
Samy Kamkar's $5 Raspberry Pi Zero-based "PoisonTap" hacking tool
Samy Kamkar
File photo: Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 h...
File photo: Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
Unsecured Tesla Kubernetes console
Unsecured Tesla Kubernetes console
RedLock
Five models and three different generations of security token devices for online banking. The newer ...
Five models and three different generations of security token devices for online banking. The newer models are in the foreground.
M0tty
A sample of WordPress pages defaced by hacking group w4l3XzY3
A sample of WordPress pages defaced by hacking group w4l3XzY3
This strong password was created by typing several random letters  numbers and symbols on the keyboa...
This strong password was created by typing several random letters, numbers and symbols on the keyboard
cups.cs.cmu.edu
Untitled
Pascal Pochard-Casabianca, AFP/File
MIT President  Dr. L Rafael Reif (on left) and IBM Senior Vice President  Cognitive Solutions and Re...
MIT President, Dr. L Rafael Reif (on left) and IBM Senior Vice President, Cognitive Solutions and Research, Dr. John Kelly III (on right), reach a 10-year, $240 million agreement to establish the MIT and IBM Watson AI Lab where fundamental joint research in AI hardware and software will be conducted to propel scientific breakthroughs that will unlock the potential of AI.
MIT and IBM Watson AI Research Lab
Untitled
Loic Venance, AFP
A hacker in action.
A hacker in action.
Davide Restivo (CC BY-SA 2.0)
Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
PICTFOR

Latest News
Top News