In the age of Big Data risks are big too
Big Data means increased risks: a large-scale leak may lead to tremendous reputational damages, so cyber-resilience is extremely important.
1219 articles
Big Data means increased risks: a large-scale leak may lead to tremendous reputational damages, so cyber-resilience is extremely important.
Big Data is widely used for security purposes, especially in the banking sphere. However, the amount of security-related data causes an issue of its own.
Big Data allowed to beat cyberfraudsters over the extended frontage. Unfortunately, they read the very same books as the security and Big Data experts.
A new criminal campaign targeting a large European bank had been discovered earlier this year – the Luuuk. For one week, criminals managed to steal as much as 500k Euros from 190 accounts, before they hastily withdrew from sight.
Cybercriminals go for small businesses the same way lions go for a herd of antelope: it’s the weakest that will go down. Yet there are a few simple safety rules that will allow your business to stay breach-free.
Big Data is widely used by businesses to gather information on their consumers. But it’s quite evident that the same Big Data may be used against the businesses as well.
Big Data concept is the new “big thing” of the last two or three years. While it promises a lot of advantages, there are voices of doubt and reservation. This week we are publishing a series of blog posts dedicated to Big Data, trying to find out what this “big” is about. Stay tuned!
On the trail of Cabir’s “jubilee”, a new story about Nokia’s Symbian surfaced, involving stolen code, blackmail, charity donation, and a bag with several million euros. One day it could become a script for a criminal drama, but for now it is a story about sensitive data mishandling.
The Ferrari plant in Maranello, Italy, is a smart blend of the latest technology and centuries-old skills of craftsmanship. Ferrari is the producer of the best cars in the world, and to stay ahead they often employ newer technologies that later become a major trend elsewhere.
A serious elevation-of-privileges vulnerability had been discovered in Linux in late April. Bugs like this are especially problematic for businesses, and require a prompt reaction.
Yesterday marked the 10 year anniversary of the first smartphone malware being discovered. Today, Cabir worm looks harmless: it doesn’t steal money or passwords, nor does it delete users’ data. But it drains the battery within
It’s time to reconsider our stance on data storage, and in the process, perhaps we can force a little cybersecurity education. One solution is to apply “The Three Ps” to every data storage decision a company makes (at least about PII or valuable secrets).
This is a short excerpt from what is said to be unearthed medieval manuscript, describing a way of keeping secrets. While we are not sure it’s authentic, the method described seems quite useful today.
Two months have passed since the Heartbleed disclosure. Now it is time for a round-up: What damage did it inflict and what can we expect?
OpenSSL reported six new vulnerabilities just eight weeks after Heartbleed. Does it mean that OpenSSL is heading for a disaster, or is it on its way to healing?
We’re pleased to announce another three accolades from an independent test lab. Dennis Technology Labs awarded our home and business products with AAA rating.
Apple has announced new versions of its operating system. OS X and iOS become closer, gradually merging into a single environment. How well is it protected?
May 2014 appears to be very stormy and volatile in regards to information security. Still overshadowed by Heartbleed and Windows XP “official demise” from April, it has brought a lot of troubles on its own.
Something very weird is going on with the popular free whole-disk encryption suite TrueCrypt. The story is still developing, but it does look like the suite ceases to exist right
Kaspersky Lab has launched new a Cyberstat portal, which shows how vast the present day cyberworld is and how quickly it expands.
In recent years, payment and banking services have been drawing closer attention of all sorts of criminals. The number of crimes related to stealing money via electronic communications keeps growing.