Chinese chip spying report shows the supply chain remains the ultimate weakness
Security
Zack Whittaker@zackwhittaker / 1 week ago
Comment
Thursday’s explosive story by Bloomberg reveals detailed allegations that the Chinese military embedded tiny chips into servers, which made their way into data centers…
Google+ to shut down after coverup of data breach
Security
Josh Constine@joshconstine / 35 mins ago
Google is about to have its Cambridge Analytica moment. A security bug allowed third-party developers to access Google+ user profile data since 2015 until Google discovered and patched it…
Facebook data breach: 4 simple steps to stay safer right now
Security BY STEVEN MELENDEZ
4 MINUTE READ
Since Facebook reported last week that hackers had stolen access tokens to almost 50 million accounts, there have been no signs that the perpetrators leaked any user data online or…
How To Access Notorious Dark Web Anonymously (10 Step Guide)
Security
By Tarquin
Updated on: 1 June 2018
Are you trying to find out how to access the dark web and what is it?
Well, look no further, we have gone and done the research so we could show you step by step the best and safest way how…
60 Must-Know Cybersecurity Statistics for 2018
Security
Rob Sobers in Data Security • Last Updated: 5/18/2018
Cybersecurity issues are becoming a day-to-day struggle for businesses. Trends show a huge increase in hacked and breached data from sources that are increasingly common…
Forget the new iPhones: Apple’s best product is now privacy
Business Intelligence, Security
Under Tim Cook’s leadership, Apple saw just how critical an issue user privacy would become. Now it’s at least as important a feature as shiny industrial design or a nice camera.
Apple CEO Tim Cook waves to the audience during…
Black Hat Puts Long-Term Social Engineering on Display
Security
Stu Sjouwerman
20 Aug
This year’s Black Hat and DEF CON 2018 conferences demonstrate how cybercriminals are taking a detailed look at their potential victims in…
Network Security: What is Attack Surface Analysis and Why is it Important?
Managed Network Services, Security11/16/2017
1What is Attack Surface Analysis and Why is it Important?
2Defining the Attack Surface of an Application
3Identifying and Mapping the Attack Surface
4Measuring and Assessing the Attack Surface
5Managing the…
TAG! YOU’RE SAFE.
Business Intelligence, Innovative Ideas, Productivity, Security
Why tagging your workforce could save money and lives
BETTER DECISIONS IN
COMPLEX ENVIRONMENTS
When an industrial plant shuts down for routine maintenance, it can be a complex…
Why Don’t Your Employees Care About Cyber Security?
Security
Stu Sjouwerman
27Jul
Whether you realize or not, your employees are a critical part of your layered defense against phishing attacks, malware, ransomware, and more. So why aren’t they concerned?
In just about…