
When it comes to cybersecurity, there are no rules. You can’t write rules that will differentiate good guys from bad guys on the Internet. That’s because the bad guys keep changing tactics, […]
When it comes to cybersecurity, there are no rules. You can’t write rules that will differentiate good guys from bad guys on the Internet. That’s because the bad guys keep changing tactics, […]
Ransomware rules the cybercrime world – perhaps because ransomware attacks are often successful and financially remunerative for criminals. Ransomware features prominently in Verizon’s fresh-off-the-press 2018 Data Breach Investigations Report (DBIR). As the […]
The deadline for compliance with the General Data Protection Regulation (GDPR) is coming up fast. Says the European Union: “Enforcement date: 25 May 2018 – at which time those organizations in non-compliance may […]
By Alan Zeichick Wireless Ethernet connections aren’t necessarily secure. The authentication methods used to permit access between a device and a wireless router aren’t very strong. The encryption methods used to handle that […]
On February 7, 2018, the carrier Swisscom admitted that a security lapse revealed sensitive information about 800,000 customers was exposed. The security failure was at one of Swisscom’s sales partners. This is […]
Recent Comments