Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with
ESET analysts dissect a novel phishing method tailored to Android and iOS users
Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme
Your phone number is more than just a way to contact you – scammers can use it to target you with malicious messages and even exploit it to gain access to your bank account or steal corporate data
Convenience may come at a cost – such as when your favorite app reveals your exact coordinates to someone you’d rather keep at a distance
Here’s how to spot and dodge scams when searching for stuff on the classified ads website that offers almost everything under the sun
Unsurprisingly, many discussions focused on the implications of the recent CrowdStrike outage, including the lessons it may have offered for bad actors
In this high-stakes year for democracy, the importance of robust election safeguards and national cybersecurity strategies cannot be understated
Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards
Having knowledgeable leaders at the helm is crucial for protecting the organization and securing the best possible cyber insurance coverage