1 in 4 employees say they still have access to accounts from past jobs, survey finds

1 in 4 employees say they still have access to accounts from past jobs, survey finds

Nearly half of professionals also admit to sharing passwords and more than a third say they write them on paper, according to Beyond Identity. Image: anyaberkut, Getty Images/iStockphoto A survey of more than 1,000 professionals reveals that most think their work password practices are secure, but the reality of the situation is anything but. Nearly half admit to password sharing, more than a third say they write their passwords on paper, and one in four…

Read More

BA Settles with Data Breach Victims

BA Settles with Data Breach Victims

Compensation is to be paid to thousands of victims of a large-scale data breach at British Airways (BA).  A legal claim was filed against the airline over a security incident that began in June 2018. Data belonging to around 420,000 people was compromised in a cyber-attack that went undetected for more than two months. Between June 22 and September 5, 2018, a malicious actor gained access to an internal BA application through the use of compromised credentials…

Read More

Paving the way: Inspiring Women in Payments – A Q&A featuring Lacey Johnson

Paving the way: Inspiring Women in Payments – A Q&A featuring Lacey Johnson

  From Human Resources to IT Senior Program Manager, Lacey Johnson found her way to the payments industry purely randomly, by happy accident. Over time, she has been part of the diversification of her company’s Information Security department, which is now 40 percent women. In this edition of our blog, Lacey explains that while gender diversity and leadership has improved in recent years, there is still more to be done for true equality in the…

Read More

Industry Must Drive Forward International Collaboration on Cyber

Industry Must Drive Forward International Collaboration on Cyber

The cybersecurity industry needs to push forward global collaborative efforts to combat cyber-threats. This was the message from a panel discussion during the UK Cyber Security Association’s One Day Summit Event. Governments need to play a major role in facilitating alignment in this area. Still, the panelists believe the industry associations, who operate in and fully appreciate the increasingly dangerous cyber-threat landscape, must take the initiative for real progress to begin. Professor Lisa Short, director &…

Read More

Anomali Cyber Watch: Thousands attacked as REvil ransomware hijacks Kaseya VSA, Leaked Babuk Locker Ransomware Builder Used In New Attacks and More

Anomali Cyber Watch: Thousands attacked as REvil ransomware hijacks Kaseya VSA, Leaked Babuk Locker Ransomware Builder Used In New Attacks and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: Babuk, IndigoZebra, Ransomware, REvil, Skimmer, Zero-day and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber News…

Read More

Free online course assesses COVID-19 workplace risk

Free online course assesses COVID-19 workplace risk

Free online course assesses COVID-19 workplace risk | 2021-07-06 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

The Industry Applauds MVISION XDR – Turning Raves into Benefits | McAfee Blogs

The Industry Applauds MVISION XDR – Turning Raves into Benefits | McAfee Blogs

Do you usually read what critics say before deciding to see a movie or read a book? We believe these McAfee MVISION XDR reviews were worth the wait. But rather than simply share a few top-tier analyst blurbs with you, we’d like to walk through what these insights mean to our growing set of customers and how their sec operations will evolve with greater efficiencies. Extended Detection and Response products, better known as XDR, not…

Read More

The Audacity! How to wreck an open-source project and anger a community

The Audacity! How to wreck an open-source project and anger a community

Audacity software has been acquired, and the new verbiage added to the privacy policy has the open-source community up in arms. Image: Kheng Guan Toh/Shutterstock Audacity. Surely, you’ve heard of it. It’s one of the most widely used apps by podcasters everywhere. It’s one open-source project that has managed to strike the perfect balance between feature list and usability. It has everything you could possibly need to record podcasts, music and just about any type…

Read More

Kaseya supply chain attack impacts more than 1,000 companies

Kaseya supply chain attack impacts more than 1,000 companies

The REvil group is claiming that over 1 million devices have been infected and is demanding $70 million for a universal decryption key. Image: Shutterstock/Vchal A ransomware attack against a single company’s software product is having a ripple effect across more than 1,000 organizations. On July 3, enterprise IT firm Kaseya revealed a successful cyberattack against its VSA product, a program used by Managed Service Providers (MSPs) to remotely monitor and administer IT services for…

Read More
1 2,300 2,301 2,302 2,303 2,304 2,690