A new report points out the dangers to customer data of website reliance on multiple third parties. In an effort to make websites attractive and easy to use for their customers, companies have also made them attractive targets for criminals. That’s one of the broad conclusions in a new report that points out where the
A new study explores the connections between personality traits and susceptibility to different cyberattacks. Could extraversion make you more vulnerable to social engineering attacks? It’s a possibility, as seen in research investigating links between personality traits and vulnerability to cybercrime. The study, compiled by ESET and the Myers-Briggs company, drills down into the “human factor”
Organizations with systems exploitable via the RDP flaw pose an increasing risk to themselves and other organizations, BitSight says. New Internet scan data shows that if an exploit for the BlueKeep RDP vulnerability disclosed in May were to become publicly available this week, more than 800,000 systems would be at immediate risk of compromise. The
Collaboration applications make users and IT teams more efficient. But they come with an added cost: security.
They haven’t completely replaced phone calls or email, but communication and collaboration apps are becoming increasingly popular. For workers today, who are in and out of the office, working on the go, with multiple team members, it’s
Firmware vulnerabilities provide direct access to server hardware, enabling attackers to install malware that can pass from customer to customer. Firmware vulnerabilities in so-called bare-metal cloud servers let attackers install malware and backdoors, which remain active and grant access as servers are reassigned to new customers. Researchers at Eclypsium are today releasing a report on