VoIP gear, hypervisors, medical equipment, building automation, printers, and more pose broad risk to organizations, with many facing danger from a combo of IT, IoT, and OT all at once. This listicle breaks it down.
Tokenization Moves Beyond Payments to Personal Privacy
Pseudonymous masking has made credit card transactions more secure, but Visa has even greater plans for tokenization: giving users control of their data.
The tranche of data, lifted from underprotected GitHub repositories, reportedly includes source code, though the country's paper of record has not yet confirmed the nature of the data accessed.
New internet routing security rules proposed by FCC
Increasing security risks associated with the Border Gateway Protocol used for internet routing — including cyberespionage, data theft, and critical infrastructure disruption — has prompted the Federal Communications Commission to propose new rules...
Over 750K impacted by Frontier Communications hack
Major U.S. internet, phone, and TV service provider Frontier Communications had data from 751,895 individuals, including names and Social Security numbers, compromised following an April cyberattack by the RansomHub ransomware operation, according to...