home.aspx
 
EVENTS

The RSA Conference 2020
THE RSA CONFERENCE 2020
July 15-17, 2020
RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points o...

WASHINGTON DC CYBERSECURITY CONFERENCE
WASHINGTON DC CYBERSECURITY CONFERENCE
July 23-23, 2020
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. ...

Amazon

SHARESHARESHARE
Amazon strives to be Earth's most customer-centric company where people can find and discover virtually anything they want to buy online. By giving customers more of what they want - low prices, vast selection, and convenience - Amazon continues to grow and evolve as a world-class e-commerce platform. Founded by Jeff Bezos, the Amazon.com website started in 1995 as a place to buy books because of the unique customer experience the Web could offer book lovers. Bezos believed that only the Internet could offer customers the convenience of browsing a selection of millions of book titles in a single sitting. During the first 30 days of business, Amazon fulfilled orders for customers in 50 states and 45 countries - all shipped from his Seattle-area garage.
SHARESHARESHARE

RELATED NEWS


By 2026, IoT connections will exceed 23 billion across all major IoT markets. Almost all those connections will be faced with incessant and constantly evolving cyber-threats, forcing implementers and IoT vendors to embrace new digital security options to protect managed fleets and connected assets. Secure device authentication currently stands among the top-tier investment priorities for key IoT markets. Global tech market advisory firm, ABI Research, expects that hardware focused IoT authentica...
PR NEWSWIRE
READ MORE

Led by Noam Rotem and Ran Locar, vpnMentor’s research team of ethical hackers, recently discovered a data leak by the popular app Key Ring, that compromised the privacy and security of their 14 million users. Key Ring allows users to upload scans and photos of membership and loyalty cards onto a digital folder on one’s phone. However, many users also use it to store copies of IDs, driver licenses, credit cards, and more. A misconfigured Amazon Web Services (AWS) S3 bucket owned by th...
SECURITYMAGAZINE
READ MORE

  • The issue was first reported on the XDA forum back in April 2019.

  • The exploit was successfully tested on all MediaTek 64-bit chipsets used in several devices including Motorola and OPPO.

  • CISO MAG
    READ MORE

  • The X-Force Threat Intelligence Index highlights the most important trends that can help an organization better assess risk factors, understand relevant trends, and bolster its security in 2020.

  •   Phishing, using stolen credentials, and attacking known...
    SECURITYINTELLIGENCE
    READ MORE

Led by internet privacy researchers Noam Rotem and Ran Locar, vpnMentor’s research team discovered a data breach in THSuite, a point-of-sale system in the cannabis industry. The research team identified an unsecured Amazon S3 bucket owned by THSuite that exposed 85,000 files of sensitive data from multiple marijuana dispensaries around the U.S. and their customers. The leaked data included scanned government and employee IDs, exposing personally identifiable information (PII) for over 30,0...
SECURITY MAGAZINE
READ MORE

If you survey the owners, chief technology officers and IT specialists of most small- to medium-sized enterprises (SMEs) and ask them to highlight the digital dilemmas keeping them awake at night, cybersecurity will likely top most of their lists.
Finding the professionals needed to fend off cyberattackers would surely come a close second.
“There are a lot of smart people out there, but they’re being hired by the big companies,” says Alex Dow, chief technology off...

THE GLOBE AND MAIL
READ MORE

An American transport authority has responded to a malware attack by permanently closing its online store. The Southeastern Pennsylvania Transport Authority (SEPTA) shuttered the site Shop.SEPTA.org within an hour of discovering that the personal data of 761 customers had been stolen in a data-skimming Magecart attack. Hackers were able to steal shoppers' credit card numbers, names, and addresses during an online crime spree thought to have begun on June 21 and ended on July 16. The store, w...
INFOSECURITY
READ MORE

The University of Texas at San Antonio (UTSA) has launched Galahad, an open source revolutionary user computer environment (UCE) for the Amazon Cloud. The technology, which is named after the Arthurian knight that ultimately secured the Holy Grail, will fight to protect people using desktop applications running on digital platforms such as Amazon Web Services (AWS). Galahad will leverage nested virtualization, layered sensing and logging to mitigate cloud threats. These layers will allow individ...
UTSA
READ MORE

Canonical this week moved to simplify its service offerings in an attempt to lower cost and attract more customers looking to jump into the open source game. The move also comes ahead of a planned initial public offering that could handsomely compensate the company’s staff. The move is under its Ubuntu Advantage (UA) for Infrastructure program that consolidates enterprise security, compliance, and support for up to 10 years. It consolidates that support for Linux, Kubernetes, Docker, OpenS...
SDXCENTRAL
READ MORE

Around a fifth of all web traffic last year was linked to malicious bot activity, with financial services hit more than any other sector, according to Distil Networks. The security vendor compiled its 2019 Bad Bot Report from analysis of a global network covering thousands of anonymized domains. It claimed to have discovered hundreds of billions of “bad bot” requests across this network, enabling large-scale, automated malicious activity including: web scraping, competitive data mini...
INFOSECURITY MAGAZINE
READ MORE

EVENTS

The RSA Conference 2020
THE RSA CONFERENCE 2020
July 15-17, 2020
RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points o...

WASHINGTON DC CYBERSECURITY CONFERENCE
WASHINGTON DC CYBERSECURITY CONFERENCE
July 23-23, 2020
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. ...