The top-10 mistakes made when configuring enterprise IT systems
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
84 articles
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
We explain what OSINT is, why it has to be front-of-mind at all times, and how to guard against hackers using it.
How social engineering helped hack the CIA chief, hijack Elon Musk and Joe Biden’s Twitter accounts, and steal half-a-billion dollars.
Vulnerabilities found in the Exynos chipset allow Samsung, Vivo and Google smartphones to be remotely hacked if the owner’s phone number is known. How is this possible, and how to protect yourself?
Hackers from Lapsus$ group claim they breached Okta, a major provider of access management systems.
This week, Dave and Jeff talk about Zoom-bombers, Donald Trump hackers, and some Scouts tackling fake news.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
How tools designed to study and protect rare species can turn from gamekeeper to poacher.
This week’s Transatlantic Cable podcast dishes on a hacked plastic surgeon, unsafe dating apps, new forms of 2FA, and more.
If the rumours are true, 40 million Apple iCloud accounts have been hacked.
Do you have some long abandoned accounts? Do you use the same password everywhere? If so, change all of them now!
We’ve seen drones armed with chainsaws and guns. More alarming though is how easily they can be hacked.
Hackers took control over several USA FM stations’ equipment and released a provocative podcast on the air.
Ryan Naraine and Juan Andrés Guerrero-Saade discuss the threat landscape and what is being done to pre-vent major attacks.
Eugene Kaspersky discusses how the world can move towards being more secure.
These incidents sound like a detective story, but are taken from real life. It’s almost impossible to avoid targeted hacking and here we explain why is that so.
2015 proved: it’s possible to hack a connected car remotely. But is it as dangerous as it seems?
Kaspersky Lab and partners reveal details of the joint investigation of the Lazarus group hazardous activity.