U.S. President Joe Biden today signed a National Security Memorandum that aims to improve the cybersecurity of national security systems. The memo gives new powers to the NSA to oversee cybersecurity improvements such as the use of the multifactor authentication, encryption and endpoint detection services.
The Singapore Personal Data Protection Commission has fined Commeasure Pte. Ltd., which operates hotel booking platform RedDoorz, S$74,000 - or U.S. $54,637 - for what the commission called the "largest data breach" since its inception in 2012, which put at risk 5.9 million customer records.
In ransomware attacks, cybercriminals attack through the backups because they know that security practitioners rely on backups to save themselves after a ransomware attack. Therefore, it is essential to have multiple backups, says Tom Kellermann, head of cybersecurity strategy at VMware.
The drive towards digital transformation and cloud has exposed organizations to unknown vulnerabilities and various forms of threats and attacks, resulting in cybercriminals stealing sensitive data.
There has been a compelling need for enterprises to protect sensitive data and reduce the scope of compliance...
Security researchers identified flaws in messaging app Telegram's cryptographic protocol, MTProto, that enabled intruders to access encrypted chats and alter the messages. Those flaws have since been patched.
In a multinational effort led by the Dutch National Police, authorities seized servers and web domains used by DoubleVPN, a Russia-based company that allegedly provided a safe operating infrastructure for cybercriminals, according to Europol.
Security specialists are offering preliminary feedback on Microsoft's sneak peek at the new security measures to be included in the Windows 11 operating system, which is slated for release in December.
In the digital world, data-smart security translates into decision-smart growth. Creating a resilient organization built on trust requires a new mindset. IT leaders today are using use data intelligently in security decision-making—and ensuring they have the right infrastructure, systems, and culture as reliance on...
What do the world's leading encryption and security experts think about non-fungible tokens, supply chain attacks, coordinated vulnerability disclosure and the state of quantum computing? The cryptographers' panel at RSA Conference 2021 addressed all these issues.
The ongoing pandemic has driven massive changes in business operations, including increased remote work and accelerated cloud transformation. But while those have enabled organizations to be more agile, they also pose multiple compliance and operational challenges, says Todd Moore, vice president of encryption...
Can courts trust evidence collected by Cellebrite's mobile device forensic tools? Matt Bergin of KoreLogic has found new vulnerabilities in Cellebrite's software that he will present on Friday at Black Hat Asia. He says that forensics software should be put through rigorous penetration tests.
Law enforcement agencies use forensics tools from Israeli company Cellebrite to gain access to locked mobile devices and extract data. But the creator of encrypted messaging app Signal says he's found vulnerabilities in Cellebrite's tools, raising questions about whether the extracted data can be trusted.