In the last few days it has come to light that blender manufacturer NutriBullet and guitar tuition website Truefire fell foul of hackers who planted Magecart-style malicious code on their sites which went undetected for months, stealing the credit card details and personal information from users.
All about Virtualization and Cloud Security | Recent Articles:
More and more businesses are falling victim to Business Email Compromise, where scammers fool companies into transferring money into the bank accounts of criminals.
Earlier this week, police in Japan launched what was described as a "three day public-private cybersecurity exercise" focusing on the risks faced by teleworkers.
Anyone who has been following security trends in recent years cannot fail to have noticed the preponderance of data breaches which have stemmed from unsecured Amazon S3 buckets.
As Business Insider reports, Palo Alto Networks has suffered a data breach.
When computer users and businesses ask me for a single step they could take to dramatically enhance their security it's easy to answer: enable multi-factor authentication.
We all know that Business Email Compromise (BEC) is one of the most dangerous IT threats facing organisations today.
AIG, one of the largest insurance companies in the world, has issued a report which reveals that there is a new leader in the list of top threats causing losses for businesses.
The Financial Crimes Enforcement Network (FinCEN), part of the US Department of the Treasury, has released an alert to financial institutions that fraudsters are attempting to steal much more money through Business Email Compromise than previously believed.
With 180 million active users it's no wonder that Microsoft Office 365 has caught the attention of online criminals.
Google has admitted that some of its business customers of G Suite (formerly known as Google Apps) had their passwords stored on the company’s internal servers for 14 years in plaintext.
As budgets tighten it’s not uncommon for consumers and organisations alike to save a few pennies, and buy previously-used IT equipment and storage devices.