What’s the best way to protect your proprietary business secrets or financial data? One common recommendation is to implement two-factor authentication. As you undoubtedly know, two-factor authentication limits the usefulness of any credentials that attackers may have acquired or created, restricting their ability to move laterally within the organization or access your VPN to log back in remotely and attempt to gain ever more powerful credentials.
IBM researchers uncovered an attack that could allow a hacker to impersonate someone by abusing the social login mechanism.
While many groups linked to nation states have conducted cyber-espionage operations against other countries and their industries, a study finding that Iranian hackers had allegedly infiltrated the networks of global critical infrastructure firms has caused concern among security experts.
Intel has bought its way into the tablet market, but success seems years away in smartphones, despite billions of dollars spent.
The allure of mobile devices has led Intel to take some uncharacteristic moves that defy the company's proud tradition of designing and manufacturing chips in-house. Intel has partnered with Chinese companies to build some smartphone and tablet chips, and is relying on third parties to manufacture those chips.
Hackers have struck again at Sony Pictures Entertainment, threatening employees of the studio in a new email obtained by Variety.
The GOP group, which hacked Sony on Nov. 24, said it planned to eradicate all of Sony Pictures Entertainment.
Employees were told to turn off their handheld devices after receiving the message, sources tell Variety. “We are aware of the situation and are working with law enforcement,” a spokesman said in a statement.