Google and the state of California have come to loggerheads over legislation designed to require Google to provide financial support for local journalism. Naturally, Google is fighting this with a PR and lobbying blitz. They and their allies may be missing the point. Whatever the outcome, it could have a profound impact on the democratic process. The legislation, The California Journalism Preservation Act (CJPA) has been wending its way through…
With the rise in popularity of cryptocurrencies, there has also been an alarming increase in cryptocurrency scams that target unsuspecting investors.
A relatively new “smishing” attack (using SMS texts to gather personal information) is moving through the US, with the attackers posing as the United States Postal Service (USPS). There are many variants but they all ask for personal information and,
Fake news is a more significant threat to cybersecurity than most people realize, therefore it’s essential to be aware of how one can certify a news story’s validity online.
Today marks International Women in Cyber Day. Cyber Protection Magazine collected commentaries from women around the cybersecurity industry.
Read our archived Newsletters here.
The healthcare industry is a vulnerable target of cybercriminals, but not for the reasons most business sectors are. Between 80 and 90 percent of all cybercrime results from people not following basic cyber hygiene practices, but in healthcare criminals gain access to information through infrastructure weaknesses and the murky third-party agreements.
It’s World Password Day. If you’re still using weak passwords or one password for all your online services – read this article to hear what some experts say and what you need to change now.
Hackers have a new way of stealing data: impersonating members of law enforcement agencies and making emergency data requests (EDR) for information.
Newly published research gives new insights into the key cybersecurity challenges including the prevalence of social media attacks, phishing and malicious email attacks. It reveals how threat actors are shifting strategies as they look for ever more effective ways to mount attacks emphasising that organisations must remain vigilant.
We caught up with founder and CEO of Cyberus Labs, Jack Wolosewicz on his view on the future of security in IoT and 5G technology.
Many experts believe cyberattacks against countries imposing sanctions against Russia are imminent. Organizations should be on high alert for the cyberattacks recently used in this conflict.
The benefits of quantum computing are a bit hazy, but the danger of the technology is significant. Nation-states are pushing hard to develop quantum computers primarily to break the strongest encryption codes available. That makes governments, infrastructure organizations and corporate
The recent US Supreme Court decision on abortion didn’t just set back women’s rights by half a century. It also restored the rhythm method of birth control, and imperils a women’s privacy rights. It is relatively difficult for women to
In honor of Women’s Equality around the world, we are thrilled to put a spotlight on the amazing story of Imevet Checol
Women’s Equality Day has become a marker for how far gender equality has come over the last century. We’ve asked industry expert to reflect on the past, present and future of women in cyber.
Hacker showed how to hack John Deer automated equipment
There are two kinds of cloud security, and both can be explained using the analogy of a medieval city or village. Let’s do the time warp (again).