Dropbox warns about a Dropbox Sign breach
Dropbox has shared a report on a data breach in the Dropbox Sign e-signature service. What does this mean for users, and what should they do?
21 articles
Dropbox has shared a report on a data breach in the Dropbox Sign e-signature service. What does this mean for users, and what should they do?
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
DIY security trainings for your colleagues that are both fun (for you) and educational (for them).
Food delivery services’ databases may not contain payment information, but leaks can still cause major problems.
Can you be sure your employees are working responsibly with personally identifiable information?
Report on the research about the applied telehealth practices, views on the development and the difficulties that emerge when providing medical services remotely.
In the face of high-profile ransomware attacks on healthcare institutions, here’s how to protect your business from the threat.
Hackers trying to inflict maximum reputation damage are sending out links to the data they stole through Accellion FTA vulnerabilities.
Our colleagues researched economic aspects of cybersecurity and reported on the dominant trends.
A few stories about how easy it is to accidentally leak sensitive information into the public domain.
This week Dave and Jeff take a look at a leaked Google Doc that the NHS would like to take back, unemployment scams in the US, a Star Wars–Top Gun mash-up, and more.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
In this post we explain why digital clutter can cost you your job.
Jeff and Dave discuss a fake Fortnite app, China visiting the dark side of the moon, Facebook breakup, Teensafe, and more.
Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.
In this podcast, Jeff and Dave discuss the Facebook and Cambridge Analytica debacle, hackers making bomb threats, and more.
Journalists and their whistle-blowers managed to keep the biggest data leak in secret. How did they do it?
Devices that have functions of especial importance or that contain top-secret information are usually not connected to the Internet. However, going offline is not the ultimate protection anymore
Modern smartphones consume so much energy that charging them once a day is not always enough. When they are used intensively, the user sometimes has to look for a power