Articles By This Author

News

Researchers Discover ‘Schoolyard Bully’ Android Malware Stealing Facebook Logins of 300,000 Users

Security researchers at mobile security company Zimperium discovered an Android malware variant on Google Play Store and third-party app stores targeting the victims’ Facebook logins.

News

Lessons Brands Can Learn From Midterm Election Disinformation

In the weeks leading up to the midterm elections, two public service announcements issued by the FBI and CISA warned of potential threats to election

News

Expert Cybersecurity Predictions for the Next 5 Years

Looking towards the next 5 years, it’s not just network servers, money, or data we need to be concerned about in the cybersecurity space —

News

Chinese Hackers Believed To Be Behind Security Breach at Amnesty International

Canada’s branch of Amnesty International is reporting that an early October security breach of the organization’s IT infrastructure has been traced back to state-sponsored Chinese

News

DoD to Migrate from Traditional Network Security to Zero Trust Architecture by 2027

The Department of Defense (DoD) published the Zero Trust Strategy and Roadmap document for migration to zero trust architecture from the traditional network security strategies

News

Millions of Dollars in Covid Benefits Likely Stolen by Chinese Hackers, Says US Secret Service

Foreign theft of US Covid benefits is a well-documented issue at this point, but to date most of this was presumed to be the work

News

5 Information Security Quick Wins for SMBs

According to Gartner, the volume of cyberattacks increased over 100% in Europe, East Asia, and Latin America in October and November 2020. Canada and Germany

News

Software May Be Eating the World and Your IT Budget

The Software-as-a-Service market continues to explode as enterprises increasingly adopt cloud-based applications to fuel business growth. According to a 2022 State of SaaS Management Report

News

Apple to Add End-to-End Encryption to iCloud Backups

One of the few significant holes in Apple’s end user security is set to be addressed, as Cupertino has announced plans to introduce end-to-end encryption

News

Major Android Security Leak: Manufacturer Signing Keys Used To Validate Malware Apps

A security leak involving manufacturing keys from major device producers (such as LG and Samsung) has created a path for malware apps to make it