Tag Archive for: security

21 technology tipping points we will reach by 2030

, , ,
Cadie Thompson, Tech Insider Shutterstock/GaudiLab Nov. 12, 2015, 1:57 PM From driverless cars to robotic workers, the future is going to be here before you know it. Many emerging technologies…

An industrial manufacturing perspective: Tech Trends 2019

, , ,
Deloitte Beyond the digital frontier How can industrial manufacturers keep pace in a quickly evolving industry? By tackling transformation head-on and embracing change. As technology trends reshape how value is delivered to…

Week in Breach

,
This week, credentials from the Dark Web compromise a company's network, healthcare records are held for ransom, and data breaches become more expensive.   Dark Web ID Trends: Top Source Hits: ID Theft Forums Top…

Week in Breach

,
The Week in Breach: 07/17/19 - 07/23/19 By Kevin Lancaster on Jul 24, 2019 4:42:02 PM This week, hackers send a message to government agencies, employee errors compromise thousands of people’s data, and Australians demand data security…

How to use Alexa and still keep your privacy

,
Update your Amazon Alexa settings to make your smart speaker a bit more secure. BY  MEGAN WOLLERTON APRIL 25, 2019  Smart speakers add a level of convenience to daily life, but there…

The Week in Breach

,
United States - NEO Urology Exploit: Ransomware NEO Urology:…

Cyber Heist News

[Heads-up] The U.S. Launched A Cyber Attack On Iran, And We're Expecting Spear Phishing Strike Backs   CyberheistNews Vol 9 #26   |   June 24th., 2019 [Heads-up] The U.S. Launched A Cyber Attack…

The Top Ten IoT Vulnerabilities

,
Kevin Ashton coined the phrase the “Internet of Things” (also known as “IoT”) back in 1999. This term represented the concept of a massive system where everyday appliances would communicate with each other through omnipresent sensors. Since…

The Week in Breach

,
Breach news to share with your customers!   This week, ransomware shuts down a food bank, Canadian patient data is leaked via employee email, and Australian universities…

“You can’t relax”: Here’s why 2-factor authentication may be hackable

,
PUBLISHED SAT, JAN 5 2019  11:09 AM ESTUPDATED SAT, JAN 5 2019  1:20 PM ESTJennifer Schlesinger@JENNYANNE211Andrea Day@ANDREADAY KEY POINTS Cybercriminals can now use a type of phishing to get around two-factor…