1.5 million active users of cloud-based backup firm, Carbonite, are forced to reset passwords following the recent discovery of a reused password attack.
Following spate of mega-breaches, unauthorized login attempts in several web services and online platforms rise, including recently-reported reused password attacks on Github and Citrix.
From January to May 2016, we asked respondents from all over the world to gauge their company’s readiness in different areas identified in our 2016 Trend Micro Security Predictions.
In 2014 alone, cybercriminals hacked and exposed the personal information of 110 million Americans—nearly half of the US adult population. In light of Data Privacy Day, here’s what you can do to learn from past security mistakes.
In light of recent incidents that exposed security holes in U.S. government agency systems, President Barrack Obama issued a memorandum mandating the strict use of secure connection protocols on all publicly accessible websites and services.
The US House of Representatives voted to end the bulk collection of phone metadata being done by the NSA, aiming to strike a better balance between national security and privacy. But how will things change and what will it mean to you?
Understanding the ecosystem of hardware, software, and services used in each organization’s network, the data/telemetry collected and sent outside it, as well as the challenges caused by the emergence of the Internet of Things (IoT).
Our idea of “secure” should reflect the reality that there will always be threats and vulnerabilities. The first step to ensure your online safety is to be aware about the different kinds of threats. Find out what you can do to prevent online abuse.
Europe’s digital economy is expected to significantly improve after the EU data protection reform is implemented. Is your company ready to adjust to such changes?