Cyber Security

bg
Fake News and Influence: Information Warfare in the Digital Age

Fake News and Influence: Information Warfare in the Digital...

It's been around forever, but in a modern digital era marked by influence campaigns...

bg
Data Breach Numbers Skyrocket in 2019

Data Breach Numbers Skyrocket in 2019

The number of data breaches is on the rise in 2019.

bg
1.5% of Web Logins Use Breached Credentials

1.5% of Web Logins Use Breached Credentials

Credential stuffing is popular because it pays off, a report from Google has found.

bg
UK ICO Investigates Facial Recognition Technology in King's Cross

UK ICO Investigates Facial Recognition Technology in King's...

The UK Information Commissioner is concerned about the use of facial recognition...

bg
News Wrap: DejaBlue Bugs and Biometrics Data Breaches

News Wrap: DejaBlue Bugs and Biometrics Data Breaches

From the biometrics of one million being exposed, to new Microsoft Bluekeep-like...

bg
Breached Passwords Still in Use By Hundreds of Thousands

Breached Passwords Still in Use By Hundreds of Thousands

More than 300,000 users still utilize credentials that have been compromised - with...

bg
ThreatList: 4.1B Records Exposed in Breaches in First Half of 2019

ThreatList: 4.1B Records Exposed in Breaches in First Half...

The number of exposed records has hit record highs in just the first two quarters.

bg
Iowa Grocery Chain Investigating Possible Hack of Payment Processing Systems

Iowa Grocery Chain Investigating Possible Hack of Payment...

A West Des Moines, Iowa-based grocery chain that also operates restaurants, fuel-pumps...

bg
Apple Sues Corellium Over Security Research Tool

Apple Sues Corellium Over Security Research Tool

Apple has filed a copyright infringement lawsuit against Florida-based virtualization...

bg
iPhone holes and Android malware – how to keep your phone safe

iPhone holes and Android malware – how to keep your phone...

Watch the latest Naked Security Live video for our non-technical tips to improve...