Why do you need to talk to your kids about online threats?

The evolution of cyberspace has brought with it an evolution of threats targeting children. Why is it so important to talk about them? The internet has been around since the early 90s, and understandably the threats that both kids and adults face have changed massively. Back then kids’ safety was mostly about keeping kids away … More Why do you need to talk to your kids about online threats?

200,000 Facebook Marketplace user records leaked on hacking forum

A threat actor leaked 200,000 records on a hacker forum, claiming they contained the mobile phone numbers, email addresses, and other personal information of Facebook Marketplace users. Bleeping Computer* verified some of the leaked data by matching the email addresses and phone numbers on random records within the sample data shared by IntelBroker, the threat … More 200,000 Facebook Marketplace user records leaked on hacking forum

The buck stops here: Why the stakes are high for CISOs

Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses? Cybersecurity is finally becoming a board-level issue. That’s as it should be, given the increasingly important role cyber-risk management plays in strategic … More The buck stops here: Why the stakes are high for CISOs

Were 3 million smart toothbrushes just used in a DDoS attack?

It sounds more like science fiction than reality, but a Swiss newspaper reported that approximately three million smart toothbrushes were hijacked by hackers to launch a Distributed Denial of Service (DDoS) attack. Sources, such as Bleeping Computer and Bleeping Media, found it hard to credit this toothsome tale. And later the security company Fortinet, which helped give the original story … More Were 3 million smart toothbrushes just used in a DDoS attack?

Left to their own devices: Security for employees using personal devices for work

As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it. Since it helped organizations ride out the disruption wrought by the pandemic, remote work (that later often morphed into hybrid work) has cemented its staying power. With the boundaries between work and home becoming blurrier than ever, many … More Left to their own devices: Security for employees using personal devices for work