Zephyrnet Logo

Tag: Passwords

Identity Access, Endpoint Security & User Productivity

No matter where you currently are on the “return” continuum, some form of accentuated remote work, it seems- it’s here to stay. The...

Lucifer Malware Aims to Become Broad Platform for Attacks

The recent spread of the distributed denial-of-service tool attempts to exploit a dozen web-framework flaws, uses credential stuffing, and is intended to work...

Expert Commentary: Frost & Sullivan Data Breach

Today it was announced that Frost & Sullivan experienced a data breach exposing sensitive information such as first and last names, log in names, and...

Smashing Security podcast #184: Vanity Bitcoin wallets, BlueLeaks, and a Coronavirus app conspiracy

Industry veterans, chatting about computer security and online privacy. A conspiracy spreads on social media about Coronavirus tracing apps, US police...

With regard to industrial cyber, we can no longer hide our heads in the sand

The massive attack on national infrastructures in Australia, only recently publicized, as well as the attack on Israel’s water infrastructure, do well to...

Black Hat Survey: Breach Concerns Hit Record Levels Due to COVID-19

Annual "Black Hat USA Attendee Survey" indicates unprecedented concern over possible compromises of enterprise networks and US critical infrastructure.Thanks to the COVID-19 crisis,...

10 Best Tools for Software Developer Teams

From GitHub to Jira to the next big opensource project, countless of tools exist on the internet to make a developer's life easier....

How to protect remote workers from phishing and other attacks

Working from home is a new ‘norm’ for many organizations, but the shift toward remote work has been steadily increasing for the past...

Consumer security concerns at an all-time high, but priorities have shifted

31% of Americans are concerned about their data security while working from home during the global health crisis, according to a Unisys Security...

Data privacy versus data security: why is it so hard to have both?

The General Data Protection Regulation (GDPR) came into force in May 2018 and the California Consumer Privacy Act (CCPA), the US’s first state...

Password Security & Internet Protection in 2020

How to protect your passwords? Which tool to use?  How password managers secure our internet browsing and much more you can find out...

How do I select a mobile security solution for my business?

The percentage of companies admitting to suffering a mobile-related compromise has grown, despite a higher percentage of organizations deciding not to sacrifice the...

Latest Intelligence

spot_img
spot_img