Security News

Copiers' hard drives aren't typically encrypted or wiped. One result: a used copier with 300 people's medical records: just hit "print!"

Allow me to nitpick for a moment: There’s a difference between data and information. Data are the facts or details from which information is derived. As such, standalone pieces of data are rarely...



In this podcast recorded at RSA Conference 2018, Ajay Arora, founder of Vera Security, and Peter Kowalczuk, President at Canon Solutions America, talk about their recent partnership, challenges...

Growth tops the list of CEO business priorities in 2018 and 2019, according to a recent survey of CEOs and senior executives by Gartner. However, the survey found that as simple, implemental...

The default configuration on the new Western Digital My Cloud EX2 storage device allows any users on the network to retrieve files via HTTP requests, Trustwave has discovered. read more

Default configuration of WD’s My Cloud storage device keeps port open for unprivileged data exfiltration within a network.

Insights From Jonathan Nguyen-Duy of Fortinet"Digital transformation" is the theme of the year, but it comes with specific cybersecurity challenges - and they put a new burden squarely on the...

Studying how online users react to attacks in of itself is not going to solve the phishing epidemic. Researchers suggest looking at digital fraudsters' adversarial behavior.