1- Privately Owned Online servers  One of the most secure ways to store your business data and information is through privately owned online servers. ...

6 Ways to Store Your Business Data

1- Privately Owned Online servers  One of the most secure ways to store your business data and information is...

Newly Revealed Security Flaw Means Malware Could Steal Data From Android Devices

A newly revealed flaw in the Android operating system could allow wrongdoers to steal private information from your device. Both the malware...

Information Security in the Time of Covid-19 – Moving to the Cloud as a Cost-Cutting Measure Does Not Lessen Compliance Obligations

Recurringly, organizations fail to ask themselves the most rudimentary questions before moving to cloud platforms, and they suffer as a result...

Featured Article

Leave a minimal digital footprint

Your digital footprint paints a picture of who you are. Every day, whether we want to or not, most...

Trending

Online General Tips and Advice

What you do online has the potential to affect everyone – at home, at work and around the world.Practice good online safety habits with these tips and advice. [...]

Google Meet now available via Gmail for G Suite customers

Google's enterprise videoconferencing tool Google Meet is now directly accessible from Gmail, the company said Thursday. The new integration is currently available on Gmail for the web with mobile coming soon. "With Meet in Gmail, you can easily start or join a meeting in seconds," Google wrote in a blog post. "Our goal is to [...]

Microsoft: Our AI can spot security flaws from just the titles of developers’ bug reports

Microsoft has revealed how it's applying machine learning to the challenge of correctly identifying which bug reports are actually security-related. Its goal is to correctly identify security bugs at scale using a machine-learning model to analyze just the label of bug reports. According to Microsoft, its 47,000 developers generate about 30,000 bugs a month, but [...]

Selected

How cybercriminals target company emails and what you can do to prevent it

Even though malware code is always evolving and Emotet has morphed from a banking trojan to weapon that targets many industries, email still remains one of the most popular attack vectors for hackers. Phishing attacks are on the rise, spear phishing is becoming more targeted, and now text messages are turning into spam. The following advice [...]

Subscribe to our newsletter

To be updated with all the latest news, offers and special announcements.

Stay Connected

84FansLike
0FollowersFollow
6FollowersFollow

Downloads

The 2020 Crowd Strike Global IT Health Report

Report2020CrowdStrikeGlobalThreatReport

Security
Latest

Information Security in the Time of Covid-19 – Moving to the Cloud as a Cost-Cutting Measure Does Not Lessen Compliance Obligations

Recurringly, organizations fail to ask themselves the most rudimentary questions before moving to cloud platforms, and they suffer as a result...

Cybersecurity tips for small businesses – especially those with remote workers

Small businesses have been facing a mountain of problems since the coronavirus outbreak took hold of the world's economy and shifted most people to working ...

Mitigating cybersecurity risks for employees working remotely

It’s important for everyone to operate with the same caution (if not more) than they would if everybody was in an office. With an increased risk of employees falling prey to cyber attacks, business leaders must leverage new policies and technologies to keep their companies and employees safe.

Leave a minimal digital footprint

Your digital footprint paints a picture of who you are. Every day, whether we want to or not, most...

Hackers are exploiting a Sophos firewall zero-day

Hackers targeted Sophos XG Firewall devices that had their administration (HTTPS service) or the User Portal control panel exposed on the internet.

Microsoft adds File Explorer integration to Windows Subsystem for Linux in new Windows 10 Fast Ring build

Microsoft has released a new test build of Windows 10 to Insiders in the Fast Ring. That build, No. 19603, released on April 8, includes integration of File Explorer into the Windows Subsystem for Linux (WSL).

Tech Culture

​How to build a data driven culture in your business

Making business decisions based on the best available data is fundamental, but not always easy. Technology, processes, and company culture can all have an impact on how data is used within an organisation. Digital leaders suggest organisations must focus on three key areas: strategy, culture, and agility, which was discussed at a recent event held [...]

Must Read

A B-Blog special

Is the future of information security and tech conferences virtual?

The COVID-19 pandemic has brought about many changes to our personal and work lives. Among the latter are the forced work from...

Microsoft: Our AI can spot security flaws from just the titles of developers’ bug reports

Microsoft has revealed how it's applying machine learning to the challenge of correctly identifying which bug reports are actually security-related. Its goal is to correctly identify security bugs at scale using a machine-learning model to analyze just the label of bug reports. According to Microsoft, its 47,000 developers generate about 30,000 bugs a month, but [...]

Amazon took data from its own sellers to develop competing products

Amazon.com Inc. AMZN, +1.64% employees have used data about independent sellers on the company’s platform to develop competing products, a practice at odds with the company’s stated policies. The online retailing giant has long asserted, including to Congress, that when it makes and sells its own products, it doesn’t use information it collects from the [...]

Loon sends internet connection balloons to Kenya

The fruition of a project that has been a decade in the making, a subsidiary of Alphabet Inc, which is the parent...

Instagram Is Rushing To Roll Out A Memorial Account Feature Because Of COVID-19 Deaths

Instagram is speeding up plans for a new account memorialization feature, adding a “Remembering” banner under a username to signal that a...

Hardware

Dell releases new tool to detect BIOS attacks

Computer manufacturing giant Dell released on Friday a new security tool that detects attacks attempting to modify a computer's BIOS component. Named the Dell SafeBIOS Events & Indicators of Attack, the tool works by detecting changes to a Dell computer's BIOS configuration and raising an alert in companies' management consoles. The tool's [...]

Windows 10
Latest

Windows 10 turns five: Don’t get too comfortable, the rules will change again

Last week, Microsoft made a Release Preview of Windows 10 version 2004 available through the Windows Insider Program, marking what should be a very brief stopover on the way to releasing the latest Windows 10 feature update to the general public. This version will be in the market just in time for the fifth anniversary [...]

Is the future of information security and tech conferences virtual?

The COVID-19 pandemic has brought about many changes to our personal and work lives. Among the latter are the forced work from...

7 Ways Hackers and Scammers Are Exploiting Coronavirus Panic

You might have already read about various campaigns warning how threat actors are capitalizing on the ongoing coronavirus pandemic in an attempt to infect your computers and mobile devices with malware or scam you out of your money. Unfortunately, to some extent, it's working, and that's because the attack surface is [...]

Most common cyberattacks we’ll see in 2020, and how to defend against them

Cybercriminals are always busy plotting ways to attack, scam, and infect potential victims for financial gain and other reasons. Organizations can be especially tempting targets because they hold vast amounts of data, user information, customer accounts, and other assets to be compromised. Protecting your business from cyberattacks is a never-ending challenge. But to make [...]

Information Security in the Time of Covid-19 – Moving to the Cloud as a Cost-Cutting Measure Does Not Lessen Compliance Obligations

Recurringly, organizations fail to ask themselves the most rudimentary questions before moving to cloud platforms, and they suffer as a result...

Microsoft: Here’s how we’re trying to manage increased cloud demand

Microsoft prioritized the needs of first responders, healthcare workers, and others on the front line, as they've noted previously. And they've throttled some less-essential services to try to keep things humming. On April 23, officials...

Popular

6 Ways to Store Your Business Data

1- Privately Owned Online servers  One of the most secure ways to store your business data and information is...

Newly Revealed Security Flaw Means Malware Could Steal Data From Android Devices

A newly revealed flaw in the Android operating system could allow wrongdoers to steal private information from your device. Both the malware...

Information Security in the Time of Covid-19 – Moving to the Cloud as a Cost-Cutting Measure Does Not Lessen Compliance Obligations

Recurringly, organizations fail to ask themselves the most rudimentary questions before moving to cloud platforms, and they suffer as a result...