Implementing reliable security across increasingly complex company networks has become a daunting task for IT teams in the manufacturing sector. Malicious hackers are constantly coming up with newer and nastier ways to infiltrate even the smartest industrial technologies. According to recent research from IBM, destructive cyberattacks capable of rendering victim systems … [Read more...]
What Macy’s Payment System Breach Means To You
As reported by Techradar, hackers related to MageCart compromised Macy’s online payment system early last month. MageCart consists of a loose group of hackers around the world that compromise primarily magneto payment systems. By inserting malicious code into Macy’s online payment page, they captured all payment card information needed to comprise user credit cards. They data … [Read more...]
2020 Security Predictions: MFA Becomes Standard for Midsized Companies
We predict that multi-factor authentication (MFA) will become a standard security control for midmarket companies in 2020. Whether it’s due to billions of emails and passwords having leaked onto the dark web, or the many database and password compromises online businesses suffer each year, or the fact that users still use silly and insecure passwords, the industry has finally … [Read more...]
2020 Security Predictions: Attackers Will Access the Voice and/or Data of 5G Mobile Phones
The newest cellular standard, 5G, is rolling out across the world and promises big improvements in speed and reliability. Unknown to most people, in large public areas like hotels, shopping centers, and airports, your voice and data information of your cellular-enabled device is communicated to both cell towers and to Wi-Fi access points located throughout these public … [Read more...]
Android Screen Capture Vulnerabilities
Screenshots are a fundamental feature of mobile devices, and rightfully so in my opinion at least. I’d much rather screenshot something (such as memes, written text, and the like) than download media from external servers holding whatever metadata. However, there have also been instances of wanting to screenshot rather sensitive information but not being permitted to, such as … [Read more...]