The term “spoofing” might have a comic implication in some contexts, but it’s no joke when it comes to information security. In fact, this is a subject matter of a whole separate chapter in a seasoned cybercriminal’s handbook. It comprises a multitude of techniques aimed at camouflaging a malicious actor or device as somebody or something else. Out of all the nefarious scenarios that fit the mold of a spoofing attack, the following 11 types are growingly impactful for the enterprise these days.
United Natural Foods, Inc. (UNFI), a large grocery distributor in the U.S., announced that Jack Clare has been named its new Chief Information Officer.
Evasive malware grew to record high levels in 2019; over two-thirds of malware detected by WatchGuard in Q4 2019 evaded signature-based antivirus solutions, says a new report.
The White House announced the launch of the COVID-19 High Performance Computing Consortium to provide COVID-19 researchers worldwide with access to the world’s most powerful high performance computing resources that can significantly advance the pace of scientific discovery in the fight to stop the virus.
How can the modern office environment improve their operational strategy to help bolster the security of data and help employees brush up on better cybersecurity strategies? One primary method that is simple and often overlooked is two-factor authentication.
The Cybersecurity and Infrastructure Security Agency (CISA) released guidance to help state and local jurisdictions and the private sector identify and manage their essential workforce while responding to COVID-19.
The CyberNews research team uncovered an unsecured database owned by an unidentified party, comprising 800 gigabytes of personal user information.The database was left on a publicly accessible server and contained more than 200 million detailed user records.
Security researcher Bob Diachenko has found an unprotected and publicly available Elasticsearch database, which appears to be managed by a UK-based security company, according to the SSL certificate and reverse DNS records.
ClosingCorp®, a provider of residential real estate closing cost data and technology for the mortgage and real estate services industries, announced that Dan Mugge has rejoined the company as chief technology officer.
Recent data breach incidents that expose personally identifiable information and biometrics highlight the lack of proper authentication and storage protocols. Organizations need to implement effective storage-based strategies to protect the biometric data collected as a result of authentication. Why is data encryption the solution?