Cybersecurity

Android vulnerabilities could allow arbitrary code execution

Posted: October 6, 2022 by Pieter Arntz Several vulnerabilities have been patched in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution. None of the vulnerabilities have been spotted in the wild. Operating systems contain and manage all the programs and applications that a computer or mobile device is able to run. The […]

Android vulnerabilities could allow arbitrary code execution Read More »

Busting Four Popular Cybersecurity Myths

As the business world becomes increasingly digitized, you’ll have to tackle several dangers that come with doing business online. Cybercriminals nowadays have several methods to target organizations, from credential hacks to sophisticated ransomware attacks. This is why it’s critical to think about measures to protect your organization in every possible way. If you are unfamiliar

Busting Four Popular Cybersecurity Myths Read More »

icon, finance, bank-4102192.jpg

Top 9 IoT-Related Security Threats Businesses Face

The Internet of Things (IoT) is rapidly changing the technology landscape as we know it. Businesses worldwide are leveraging IoT for benefits such as seamless collaboration, access to comprehensive data and the ability to make stronger business decisions based on insights derived from substantial data. Experts estimate the total number of installed IoT-connected devices worldwide

Top 9 IoT-Related Security Threats Businesses Face Read More »

Defense Strategies to Combat Insider Threats

Insider threats are among the most dangerous cyberthreats out there. Yet, organizations of all sizes seem to be either reluctant or negligent when it comes to fighting them. Even though some companies have an insider risk management program, they have a limited cybersecurity budget for mitigating insider risk.1 Simply having an insider risk management program

Defense Strategies to Combat Insider Threats Read More »

Erbium stealer on the hunt for data

Posted: September 28, 2022 by Christopher Boyd There’s a new slice of malware-as-a-service doing the rounds, although its actual newness is somewhat contested. The stealer, called Erbium, was first spotted on forums back in July 2022, but it seems nobody is quite sure when it started being deployed and snagging victims. Nevertheless, it is now happily causing chaos for

Erbium stealer on the hunt for data Read More »

TikTok faces $28m fine for failing to protect children’s privacy

Posted: September 27, 2022 by Christopher Boyd TikTok is no stranger to controversy where data usage is concerned. Back in 2021, the social media dance extravaganza platform agreed to pay $92m to settle dozens of lawsuits alleging harvesting of personal data. There has also been concern with regard to whether or not settings were enough to keep children safe, leading to significant alterations

TikTok faces $28m fine for failing to protect children’s privacy Read More »

How to help your child manage their online reputation

Posted: September 14, 2022 by Jovi Umawing Whether your child has been socially active online for a while now or you just handed your young one their first ever smartphone, now is an excellent time to think about managing their online reputation. The concept may sound overwhelming, but doing it is easy. Since you’re no doubt talking to

How to help your child manage their online reputation Read More »

Critical WhatsApp vulnerabilities patched: Check you’ve updated!

Posted: September 26, 2022 by Pieter Arntz WhatsApp has fixed two remote code execution vulnerabilities in its September update, according to its security advisory. These could have allowed an attacker to remotely access a device and execute commands from afar. These versions of WhatsApp are affected by at least one of the vulnerabilities: WhatsApp for Android prior to v2.22.16.12 WhatsApp

Critical WhatsApp vulnerabilities patched: Check you’ve updated! Read More »