Top 4 global security threats businesses will face in 2017

While the political, social and economic implications are not fully clear, gigabit connectivity represents a significant overnight leap forward. This will enable the IoT and a new class of applications to emerge that will “exploit the combination of big data, GPS location, weather, personal-health monitoring devices, industrial production and much more. Connectivity is now so…

Millions of User Accounts Allegedly Stolen From Dailymotion

Data breach notification service LeakedSource has obtained a database containing the details of roughly 85 million Dailymotion users, including usernames, email addresses and, in many cases, passwords. According to LeakedSource, the database stores 87 million records with 85 million unique email addresses. More than 18 million of the entries also include password hashes. LeakedSource said…

Where Cybercriminals Go To Buy Your Stolen Data

With nothing more than a standard Web browser, cyber-criminals can find personal, private information all over the public Internet. It isn’t just legitimate services – from genealogy sites to public records and social media – that can be mined and exploited for nefarious purposes. Openly malicious criminal activities are also happening on the public Internet….

BrandPost: Emerging cybersecurity vulnerabilities

One unfortunate aspect of human psychology involves how people tend to deal with potential threats. As long as the threats are more abstract than actual, all too often we reason that there’s no rush to build defenses against them. Only after a threat materializes and does actual harm do we start to really take it…

How security collaboration will prove vital in 2017

The escalation of high-profile hacking and data dumps recently has underscored the increasing boldness of digital threat actors, culminating in July’s Democratic National Committee email leak and its ripple effect through American politics. The group behind the hack and its attack patterns were known, and yet the attack was not thwarted, leaving many questions as…

Retailers may be gifted FastPOS this holiday season

Chilly weather, falling leaves and pumpkin-spiced everything are signs that the holiday season is just around the corner. Retailers have already taken steps to get ready by hiring and training personnel for these busy times. However, can they say the same for their point-of-sales systems? When a person pays with a debit or credit card,…

A Trojan from Google ads

If you don’t go to suspicious sites, malware can’t get you — right? Well, no. Unfortunately, even those who do not open unreliable e-mail attachments, avoid porn sites, and do not install apps from unofficial stores are not well-enough protected. New developments suggest that malware can be found even on an absolutely legitimate site, as…

How to protect your marketing team amidst security threats

Unfortunately, businesses have never been more exposed to threats of cyber-attacks than now. As more and more information is shared online, hackers are enhancing their efforts and targeting vulnerable businesses. The good news is that there are also more security solutions available than ever before. By implementing them in the appropriate manner, you can keep…