Computer, network, and data security.

Chinese chip spying report shows the supply chain remains the ultimate weakness

Zack Whittaker@zackwhittaker / 1 week ago  Comment Thursday’s explosive story by Bloomberg reveals detailed allegations that the Chinese military embedded tiny chips into servers, which made their way into data centers…

Google+ to shut down after coverup of data breach

Josh Constine@joshconstine / 35 mins ago Google is about to have its Cambridge Analytica moment. A security bug allowed third-party developers to access Google+ user profile data since 2015 until Google discovered and patched it…

Facebook data breach: 4 simple steps to stay safer right now

 BY STEVEN MELENDEZ      4 MINUTE READ Since Facebook reported last week that hackers had stolen access tokens to almost 50 million accounts, there have been no signs that the perpetrators leaked any user data online or…

How To Access Notorious Dark Web Anonymously (10 Step Guide)

By Tarquin Updated on: 1 June 2018 Are you trying to find out how to access the dark web and what is it? Well, look no further, we have gone and done the research so we could show you step by step the best and safest way how…

60 Must-Know Cybersecurity Statistics for 2018

 Rob Sobers in Data Security • Last Updated: 5/18/2018 Cybersecurity issues are becoming a day-to-day struggle for businesses. Trends show a huge increase in hacked and breached data from sources that are increasingly common…

Forget the new iPhones: Apple’s best product is now privacy

,
Under Tim Cook’s leadership, Apple saw just how critical an issue user privacy would become. Now it’s at least as important a feature as shiny industrial design or a nice camera. Apple CEO Tim Cook waves to the audience during…

Black Hat Puts Long-Term Social Engineering on Display

Stu Sjouwerman 20 Aug     This year’s Black Hat and DEF CON 2018 conferences demonstrate how cybercriminals are taking a detailed look at their potential victims in…

Network Security: What is Attack Surface Analysis and Why is it Important?

,
11/16/2017 1What is Attack Surface Analysis and Why is it Important? 2Defining the Attack Surface of an Application 3Identifying and Mapping the Attack Surface 4Measuring and Assessing the Attack Surface 5Managing the…

TAG! YOU’RE SAFE.

, , ,
Why tagging your workforce could save money and lives BETTER DECISIONS IN COMPLEX ENVIRONMENTS When an industrial plant shuts down for routine maintenance, it can be a complex…

Why Don’t Your Employees Care About Cyber Security?

 Stu Sjouwerman 27Jul Whether you realize or not, your employees are a critical part of your layered defense against phishing attacks, malware, ransomware, and more. So why aren’t they concerned? In just about…