Hacks

How Mark Zuckerberg’s LinkedIn, Twitter and Pinterest Accounts Were Compromised.

It didn’t take long for a big name celebrity to be compromised in one of the recent data dumps due to password reuse. I...

Has TeamViewer Been Hacked?

Over the last month there have been numerous TeamViewer users reporting unauthorized access into their computers that resulted in financial loss and stolen credentials....

Is Your Data Secure From Hackers?

Many of us are familiar with Secure Hypertext Transfer Protocol (HTTPS) that uses a cryptographic protocol commonly referred to as Transport Layer Security (TLS)...

Hacktivists Using SQL Injections to Target Government Data

Over the last year, hacktivists driven by ideological differences have targeted government data around the world at a persistent rate. The lines are blurred...

You’ve Been Clickjacked!

So you have the latest in DDoS and WAF protection. You’ve ensured your company is protected against SQL injections and cross-site scripting,...

Online Credit Theft Happened to Me

Pling Pling!  You all know the tone when a new message arrives to your private mail inbox. Recently, when this happened to me, I checked...

The Stadium of the Future Is Smart, But Is It Safe? How Hackers Could Target the Super Bowl – And How to Stop It

Levi’s Stadium is one of the most technologically advanced stadiums ever built. It features 12,000 network ports, 1,200 access points, 1,700 beacons, and a DAS...

Cyber Security Predictions for 2016

It’s fun to predict what may happen over a year in security.  The industry moves so fast and while some things do stay the...

How Smoke Screen Cyber-Attacks Are Being Used in Data Breaches

2015 was a paramount year in data exfiltration. You may be familiar with many of the data breaches that were covered in the media...

ALERT: OpKillingBay Threats on the Rise

OpKillingBay is a yearly hacktivism operation by Anonymous, activists and other organizations in response to the hunting of whales and dolphins in Japan and...

Hackers Will Find Your Network’s Vulnerabilities. Here’s How To Fight Back.

A disreputable person enters a bank and walks up to the teller and presents a note asking for the teller to give them all...

What Does the Volkswagen Hack mean for IoT Security?

A remote hack-attack on Chrysler Jeeps dominated headlines this past summer when researchers used an exploit to wirelessly control parts of a car’s systems. ...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.