Infosecurity News

Bell Canada Breach Hits Nearly Two Million Customers

Bell Canada Breach Hits Nearly Two Million Customers

Canada’s largest telco claims no financial data has been exposed

More than Half of UK Business Owners Unaware of GDPR

More than Half of UK Business Owners Unaware of GDPR

Firms large and small fail to identify fines associated with new legislation

New Cryptomining Threat Could Overshadow #WannaCry

New Cryptomining Threat Could Overshadow #WannaCry

Adylkuzz uses same NSA exploits as infamous ransomware campaign

Women in Cyber: The Focus of Inaugural DC Symposium

Women in Cyber: The Focus of Inaugural DC Symposium

The inaugural event serves as a conduit between policymakers and women leaders in cybersecurity.

CEOs Are Biggest Perpetrators of Shadow IT

CEOs Are Biggest Perpetrators of Shadow IT

Three-quarters (75%) of CEOs admit that they use applications/programs that are not approved by their IT departments.

Three in Five Firms Expect a Breach This Year

Three in Five Firms Expect a Breach This Year

A third (29%) believe they won't even know they were breached when it happens.

Security Experts Investigate #WannaCry Link to North Korea

Security Experts Investigate #WannaCry Link to North Korea

Code similarities with infamous Lazarus Group are being probed

Disney Hackers Threaten to Release Upcoming Movie: Report

Disney Hackers Threaten to Release Upcoming Movie: Report

Rumors suggest latest Pirates of the Caribbean blockbuster may have been stolen

DocuSign Phisher Hacked Firm to Access Customer Emails

DocuSign Phisher Hacked Firm to Access Customer Emails

Electronic signature firm reveals phishing campaign is more targeted than first thought

#WannaCry Roars Back After Killing the Kill Switch

#WannaCry Roars Back After Killing the Kill Switch

It took about a day for bad actors to hit back after a kill switch stopped WannaCry in its tracks.

Vietnam's APT32 Marks a New Chapter in Cyber-espionage

Vietnam's APT32 Marks a New Chapter in Cyber-espionage

APT32 demonstrates how newly-available tools and techniques give even less-resourced nation-states access to advanced capabilities.

What’s Hot on Infosecurity Magazine?