A data breach may be more expensive than you think , thanks to these hidden costs |
IoT domestic abuse : What can we do to stop it ? |
Can Russian hackers be stopped ? Here ' s why it might take 20 years |
We block shady ad blockers |
How CISOs can improve their communication with the board |
When three isn ' t a crowd : Man-in-the-Middle ( MitM ) attacks explained |
How to speed up cyberattack recovery with Critical Event Management | |
Securityledger |
Grahamcluley |
Episode 103 : On the Voice-Controlled Internet , How Will We Authenticate ? |
Facebook doesn ' t want to eradicate fake news . If it did they ' d kick out
InfoWars
|
Fitness apps : Good for your health , not so much for military security |
Facebook fined a paltry £ 500,000 ( 8 minutes ' revenue ) over Cambridge
Analytica scandal
|
Military documents about MQ-9 Reaper drone leaked on dark web |
Timehop data breach is worse than they initially said |
KrebOnSecurity |
TheRegister |
Notorious ‘ Hijack Factory ’ Shunned from Web |
Like my new wheels ? All I did was squash a bug , and they gave me $ 72k |
Patch Tuesday , July 2018 Edition |
Ransomware is so 2017 , it ' s all cryptomining now among the script kiddies |
Sextortion Scam Uses Recipient ’ s Hacked Passwords |
Web biz DomainFactory confirms : We were hacked in January 2018 |
Securityintelligence |
Thehackersnews |
Calculating the Cost of a Data Breach in 2018 , the Age of AI and the IoT |
Facebook Faces £ 500,000 Fine in U . K . Over Cambridge Analytica Leak |
Does the Rise of Crypto-Mining Malware Mean the End of Ransomware ? |
Gaza Cybergang Returns With New Attacks On Palestinian Authority |
The GDPR Evolution : A Letter to the CISO |
Microsoft Releases Patch Updates for 53 Vulnerabilities In Its Software |
Techcrunch |
Trendmicro |
Netskope nabs Sift Security to enhance infrastructure cloud security |
How the Industry 4.0 Era Will Change the Cybersecurity Landscape - |
Timehop admits that additional personal data was compromised in breach |
The Aurora Power Grid Vulnerability and the BlackEnergy Trojan |
Securelist |
Tripwire |
APT Trends Report Q2 2018 |
The Five Stages of Vulnerability Management |
Coinvault , the court case |
The UK ’ s Minimum Cyber Security Standard : What You Need to Know |
Thalesecurity |
Securereading |
Knock , Knock ; Who ’ s There ? – IoT Device Identification & Data Integrity Is No
Microsoft and Adobe Releases Security Patches for Critical Vulnerabilities
Joke
| |
Trusting in technology : the need for greater assurance in connected health |
Mysterios Malware Campaign Infects 13 iPhones in India |
Zdnet | |
Fitness app Polar exposed locations of spies and military personnel |
Timehop reveals July 4 breach included gender , country , and DOB info |
Simple News | |
3 Cybersecurity Risk Factors Financial Institutions Often Overlook |
www . bitsighttech . com |