Search results for "security breach"

Reflecting on The Uber Data Breach

Recently an Uber data breach became known, and users of the app worldwide were shocked when they found out about the hack. Uber faced significant challenges during these harsh times, trying to keep it behind the public eye for as much as possible. Uber remains operational, but at what cost? What can we learn from […]

Uber Says Lapsus$-linked Hacker Responsible for Breach

Uber Technologies Inc said on Monday a hacker affiliated with the Lapsus$ hacking group was responsible for a cyber attack that forced the ride-hailing company to shut several internal communications temporarily last week. Uber said the attacker had not accessed any user accounts and the databases that store sensitive user information such as credit card […]

How to Prevent Data Breaches and Why They Happen 

The world keeps adapting to the online aspect of life day by day. Companies now have to worry about their cybersecurity to protect their interest and the safety of customer data. Data breaches are increasing rapidly, and no one is safe, especially some of the industry’s most prominent companies. It is vital to have a […]

TikTok Hack: Exposing 2 Billion Users Data to Malicious Breach 

The world’s most famous and beloved short-video application TikTok has been reportedly hacked with the hacker disclosing that an estimate of almost two billion users’ data being stolen, supported by the reveal of the source code.  The alleged hack news started circulating on a popular hacking forum over the past few days, with hackers claiming […]

Use of Cybersecurity in Telecom Industries

One of the main elements that ensure interconnectivity in the world is the telecom industry and the permanent telecommunications solutions given by knights of such industry. The telecommunications sector guarantees an intertwining between private communications and business interactions, making it an integral element of everyone’s day-to-day activities, be it through our smartphone and their connection […]

U.S. Justice Department Probing Cyber Breach of Federal Court Records System

The U.S. Justice Department is investigating a cyber breach involving the federal court records management system, the department’s top national security attorney told lawmakers on Thursday. Matt Olsen, head of the Justice Department’s National Security Division, alluded to the threat of cyber attacks by foreign nations as he told the U.S. House of Representative Judiciary […]

Password Management in Network Security

When it comes to ensuring the highest levels of cybersecurity for any establishment, password management in network security is one of the most paramount factors in guaranteeing security. As one of the essential cybersecurity measures, password management is a critical element for any online activity, whether for software or hardware. Everything is protected with a […]

Rising Cybersecurity Tactics from the Russian-Ukrainian Crisis: A Prelude to a Global War?

Contrary to general belief, cyberattacks were much older than the internet itself. The first incident, which can be qualified as a cyberattack, took place nearly two centuries ago when a pair of thieves hacked France’s telegraph wireline communications system and stole some important financial information. Since then, the evolution of telecommunication systems has been accompanied […]

Bring Your Own Device, but Don’t Forget Your Security

BYOD is 34 percent more productive, but at what cost? As a result of increased remote working, the number of personal devices accessing corporate networks grew 20 percent in 2020 alone, and this is only likely to increase. While connectivity is becoming easier, what about its impact on security? Here Ginelle Bell, UK country manager […]

Protecting your business from mobile security risks

The benefits and uses of mobile device management software According to the Government’s Cyber Security Breaches Survey 2021, 39 percent of UK businesses experienced a cybersecurity attack last year. For business owners, this statistic is worrying — risking reputation, integrity, and ultimately commercial success. As we move towards an increasingly technology-centric working world, what should […]