Data Breach: Page 3
Is It Safe For You To Use WhatsApp?
CERT-In has alerted users about a new vulnerability where hackers can attack the messaging platform using MP4 files
How Big Is the Menace of Spyware Pegasus?
According to reports, WhatsApp claims it had informed government officials about the breach in May, refuting allegations of having kept it a secret.
Data Security in the Age of Online Payments and Social Media Validation: Where Does the Buck Stop?
In the light of the now infamous Tumblr adult content ban episode, the risk of compromise and misuse of digital media becomes all the more important
How SMBs can diminish the risk of a data breach
Perceived notions of 'high-cost investment', ignorance and a mindset 'who would target us' makes the SMBs, a hacker's goldmine. This perspective needs a re-set
Don't Open That Attachment: 4 Common Data Protection Mistakes for SMBs
Here's why you should avoid these issues--and how to rectify them should they still wind up happening to you.
4 Ways Businesses and Consumers Can Take Back Their Data in 2019
Public backlash against misappropriation of personal data has reached a breaking point. Here are four things to know.
Hundreds of Millions Have Downloaded Suspicious VPN Apps With Serious Privacy Flaws. Apple and Google Haven't Taken Action.
Disturbing research suggests that nearly 90 percent of the most popular free VPN apps on Apple and Google's app stores have serious user privacy flaws.
Payments Will Be Facebook's Regulatory Waterloo
Facebook's long disregard for regulatory niceties won't work when it comes to moving payments across borders.
Does Customer Data Privacy Actually Matter? It Should.
Big tech has lost the confidence of consumers but seems to be awakening to what a problem that is.
Singapore is One of the World's Tech Leaders, Yet its Companies Are Struggling to Fight Cyberattacks
Nine in 10 firms have suffered a cyber-security breach in the past 12 months
How to Protect Data and Endpoints in the Mobile-Cloud Era
Industry analysts predict deep penetration of enterprise mobility by the year 2020
Skilful Data Management Works Wonder for Data-Driven Companies
Data needs to be securely stored with the utmost caution and entails to be frequent attention, and only expert data management can be the answer to the realm
Data Security and the Downside Risk of M&As
Here's why specialists are using a template - Information rights management technology (IRM) - to protect sensitive information from unauthorized access
A Regulatory Tsunami Is Coming: Are You Prepared?
Compliance will be an increasingly challenging business issue in 2019. Consider the 'Office of Compliance' that Xerox already has to deal with the complexity.
Blockchain Technology can be Critical to IoT Infrastructure Security
Over 45 billion IoT devices are expected to be connected by 2021, while the cumulative cost of data breaches between 2017 and 2022 is expected to touch $8 trillion