| Security Blog News |
| Showing 'Security Blog News' from 21 to 30|
| |Huaweis Smartphone OS Aims To Challenge IOS/Android Dominance: Can It Succeed? Huawei is developing their own OS as a contingency plan in the event US sanctions make using Android unviable. In a crowded market, is there room for a third OS?
| |5 Major Data Breach Predictions For 2019 Biometrics and gaming are just a couple of the new cyberattack vectors professionals can expect in 2019. Here is what else to look out for.
| |Filling The Cybersecurity Jobs Gap - Now And In The Future Employers must start broadening their search for experienced security professionals to include people with the right traits rather than the right skills.
| |Marriott Faces Massive Data Breach Expenses Even With Cybersecurity Insurance Marriotts total tab for a data breach affecting as many as 500 million consumers is going to cost billions of dollars over the next few years, based on the average cost of megabreaches.
| |Top 4 Security Threats Businesses Should Expect In 2019 Cybercriminals are developing more sophisticated attacks, while individuals and enterprises need to be more proactive in security practices.
| |Threat Hunting: Improving Bot Detection In Enterprise SD-WANs How security researchers tracked down Kuai and Bujoi malware through multiple vectors including client type, traffic frequency, and destination.
| |Marriott Reveals Data Breach Affecting 500 Million Hotel Guests Hackers have had access to the Starwood guest reservation database since 2014.
| |Man-in-the-disk Attacks: A Cheat Sheet A flaw in Android external storage opens up legitimate apps to being hacked and gives illegitimate ones a window to exploit. Learn more about man-in-the-disk attacks, including how to avoid them.
| |What Is A Man-in-the-disk Attack? Android users should beware of this dangerous attack that targets their mobile devices storage.
| |Man-in-the-middle Attacks: A Cheat Sheet Cybercrime takes on a lot of forms, with one of the oldest and most dangerous being man-in-the-middle attacks. Heres what you need to know about MITM attacks, including how to protect your company.
| « Newer 1 2 3 4 5 6 7 8 9 10 Older » |