Report Explores Child’s Data Safety Legislation Across 50 Countries

Report Explores Child’s Data Safety Legislation Across 50 Countries

Pro-consumer website Comparitech has released a new report exploring legislation about child data collection in the world’s top 50 countries by gross domestic product (GDP). The document assessed 23 different aspects of these policies to assess whether specific legislation was in place for children’s online data or not. Aspects examined included requirements for privacy policies, parental consent and authority and restrictions on who had access to the data internally. Every one of these aspects was…

Read More

Key trends in the Verizon Data Breach Investigations Report

Key trends in the Verizon Data Breach Investigations Report

<!– Key trends in the Verizon Data Breach Investigations Report | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

India’s SpiceJet Strands Planes After Being Hit By Ransomware Attack

India’s SpiceJet Strands Planes After Being Hit By Ransomware Attack

Indian airline SpiceJet delayed a number of flights on Wednesday after reporting being hit by a ransomware attack the previous day. The news was reported by the BBC, which spotted the company’s tweet earlier this week. “Certain SpiceJet systems faced an attempted ransomware attack last night that impacted and slowed down morning flight departures today,” the company wrote on Twitter on Wednesday. “Our IT team has contained and rectified the situation and flights are operating…

Read More

Ron Sanderson named Chief Information Security Officer at Redpoint

Ron Sanderson named Chief Information Security Officer at Redpoint

<!– Ron Sanderson named Chief Information Security Officer at Redpoint | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

10 tips to develop cybersecurity knowledge within organizations

10 tips to develop cybersecurity knowledge within organizations

<!– 10 tips to develop cybersecurity knowledge within organizations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Security and compliance: A missed growth opportunity for early-stage startups

Security and compliance: A missed growth opportunity for early-stage startups

<!– Security and compliance: A massive missed growth opportunity for early-stage startups | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Former CIA CISO Michael Mestrovich named CISO at Rubrik

Former CIA CISO Michael Mestrovich named CISO at Rubrik

<!– Former CIA CISO Michael Mestrovich named CISO at Rubrik | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Old Python package comes back to life and delivers malicious payload

Old Python package comes back to life and delivers malicious payload

A recently spotted supply chain attack abused an old but legitimate Python package to deliver a malicious payload. Read more on how the attacker managed to do it and how to protect yourself from it. Image: sharafmaksumov/Adobe Stock Python packages are generally updated often as their developers add new functionalities or features, remove bugs or increase stability. An old Python package named “ctx,” not updated since 2014, suddenly came back to life with new updates….

Read More

Ransomware demands acts of kindness to get your files back

Ransomware demands acts of kindness to get your files back

The great thing about working in the world of cybersecurity is that there’s always something new. You may think you’ve seen it all, and then something comes along that completely surprises you. And that’s certainly true of the GoodWill ransomware, which security firm CloudSEK described this week. In fact, the GoodWill ransomware stands out so much from the crowd that you might be forgiven for thinking that it is an April Fool’s joke that has…

Read More

[R1] Nessus Version 10.2.0 Fixes Multiple Third-Party Vulnerabilities

[R1] Nessus Version 10.2.0 Fixes Multiple Third-Party Vulnerabilities

<!– [R1] Nessus Version 10.2.0 Fixes Multiple Third-Party Vulnerabilities – Security Advisory | Tenable® Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource – BlogResource – WebinarResource – ReportResource – Eventicons_066 icons_067icons_068icons_069icons_070 This page contains information regarding security vulnerabilities that may impact Tenable’s products. This may include issues specific to our software, or due to the use of third-party libraries within our software. Tenable strongly encourages users to ensure that they upgrade or apply…

Read More
1 3,075 3,076 3,077 3,078 3,079 4,179