Emails, the gateway for threats to your company
It’s an undeniable fact: these days, email has become one of the main vectors for cyberattacks against companies. According to the recent 2018 Email Security…
The hunter becomes the hunted: How cyber counterintelligence works
Counterintelligence takes as a jumping off point one basic premise: if someone is going to attack your company, the best defense is a good offense.
Is Article 13 about to ruin the Internet?
Some Internet experts are concerned about the longer term implications of Article 13, suggesting that the new regulations could be misused.
Danger on board: shipping routes are at risk
Updates to the cybersecurity ecosystem seem to have gotten lost at sea for the shipping industry. Measures that have been outdated for years in other…
Employee habits that can put your company at risk
There are many cybersecurity risks that companies can be exposed to. And the fact remains that there are several things that employees may do every day that could well lead to serious security breaches
Who has access to your real-time location data?
Wireless carriers and middlemen-companies are not always fully aware how the data is being used and do not have an effective way to monitor if consents are obtained.
Data leak might have exposed the details of more than 120 million Facebook users
The leak was spotted by a young ethical hacker who stumbled upon personal information of Facebook users that had been left exposed and readily available to third parties to examine and use.