App Stores Remove Ride-Hailing Giant Didi Chuxing

App Stores Remove Ride-Hailing Giant Didi Chuxing

One of the world’s biggest ride-hailing services has had its app removed from the web by the Chinese authorities over privacy concerns. Regulator the Cyberspace Administration of China (CAC) ordered the country’s app store providers to remove Didi Chuxing from their platforms over the weekend. “After checks and verification, the Didi Chuxing app was found to be in serious violation of regulations in its collection and use of personal information,” the CAC reportedly said. In response, the firm…

Read More

US Spy Agencies to Investigate Kaseya Supply Chain Attack

US Spy Agencies to Investigate Kaseya Supply Chain Attack

President Biden has ordered his intelligence agencies to investigate a major ransomware supply chain attack over the weekend that targeted a vendor of IT software used by managed service providers (MSPs). Suspected to be the work of a REvil affiliate, the attack on Miami-headquartered Kaseya was spotted by its incident response team at around midday on Friday. The firm’s latest update, dated Sunday, claimed that the incident had affected around 40 on-premises customers worldwide, who will need a patch to…

Read More

The Aviation Industry Needs to Move Towards Cyber Resilience

The Aviation Industry Needs to Move Towards Cyber Resilience

2021 is a significant year for aviation. It marks the 20th anniversary of the 9/11 attacks, the worst acts of unlawful interference in the history of aviation. It is also the Year of Security Culture for the ICAO community, which aims to enhance security awareness and foster a security culture throughout the industry. The importance of understanding the threat to aviation and promoting best practices in security throughout all aviation operations is imperative considering that…

Read More

Top 5 security threats for power plants and how to proactively avoid them

Top 5 security threats for power plants and how to proactively avoid them

Top 5 security threats for power plants and how to proactively avoid them | 2021-07-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

CASB, CWPP, CSPM, and CNAPP: Which one is right for securing your cloud environment?

CASB, CWPP, CSPM, and CNAPP: Which one is right for securing your cloud environment?

CASB, CWPP, CSPM, and CNAPP: Which one is right for securing your cloud environment? | 2021-07-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Discovering Unknown Botnets with Command-and-Control Communications Analysis

Discovering Unknown Botnets with Command-and-Control Communications Analysis

Byline: Howie Xu Cloud-edge-based proxy security services like the Zscaler Zero Trust Exchange rely on Machine Learning models to detect, identify, and block malicious traffic. Zscaler (my employer) processes more than 160 billion data transactions per day, the vast majority of which are quickly recognized as benign. But it’s the minority of remaining traffic (still a huge volume) that demands further analysis: How do we ensure nothing bad gets through? Detection starts with domain analysis…

Read More

You don’t have to be a tech expert to become a cybersecurity pro

You don’t have to be a tech expert to become a cybersecurity pro

Attention to detail, creativity and perseverance are key traits for a good white hat hacker. These positions are in high demand. TechRepublic’s Karen Roby spoke to Ning Wang, CEO of Offensive Security, about what it takes to become a cybersecurity professional. The following is an edited transcript of their conversation. Karen Roby: Ning, let’s just start with the state of cybersecurity; where we are in terms of the number of professionals to fill these roles…

Read More

How Various Flavors of PKI Can Protect and Secure Financial Services Data

How Various Flavors of PKI Can Protect and Secure Financial Services Data

By Abul Salek, Director of Product Management, Sectigo How much time and budget does your company allocate to cybersecurity to protect you and your customers’ critical data and private information? Is your organization doing enough, or is your information at risk? In many ways, data constitutes the essential lifeblood of the financial services industry. From providing real-time account and trading information to automating risk management processes, forecasting, and fraud detection, to managing real-time transaction details,…

Read More

Hacker Blamed for Reality TV Star’s ‘Death’

Hacker Blamed for Reality TV Star’s ‘Death’

A reality TV star whose sudden death was reported by several websites says she was the victim of a malicious hacker.  Saaphyri Windsor shot to fame after appearing on American dating gaming show Flavor of Love, which starred Public Enemy rapper Flavor Flav. On Thursday night, after news of her death began circulating on the internet, Windsor announced publicly that she was in fact still drawing breath. Confusion over how the star may have shuffled off…

Read More
1 2,199 2,200 2,201 2,202 2,203 2,586