Data Net Blog
You’ve more likely than not purchased a ticket through Ticketmaster at some point in your lifetime, so you might be interested to find out that Live Nation Entertainment—Ticketmaster’s parent company—has had to file an 8-K with the Security and Exchange Commission to admit that 1.3 terabytes of data had been hacked. The result is that more than 560 million customers’ personal information was stolen from company servers.
What happens when the tools designed to keep organizations safe from network breaches, are the victim of a cyberattack? After all, these tools are just applications, albeit sophisticated pieces of security software, they can run the risk of being exploited much in the same way any other software is. This is exactly what happened to cybersecurity giant Barracuda as it was the victim of a zero-day exploit. Let’s take a look at the hack and how you can protect your business from sharing the same fate.
Zero-day vulnerabilities are never fun, but this is especially the case with popular devices, like the many that use the Samsung Exynos modem. Google’s Project Zero has discovered 18 such vulnerabilities in these chips, four of which allow for remote code execution. Why should you be concerned about these vulnerabilities and what can you do to minimize your risk?
World Backup Day is March 31st, each and every year. However, while there is value to having a dedicated holiday to raise awareness of the need for backup, it should not be the only time it is considered. Let’s go over the importance of proper backup practices, just in time for the holiday, so that you can establish the backup that your business needs if it's not already in place.
Bad news—thanks to four flaws in Microsoft Exchange Server software, over 60,000 individuals and organizations have had their emails stolen by a cyberespionage unit based in China, with over 30,000 of those targeted being in the United States. Let’s review what has taken place up to the time of this writing, and what can be done about it.
We’re always talking about the importance of keeping your software up to date. It is the very best way to avoid the vulnerabilities that can cause data breaches. When the Department of Homeland Security tells organizations to patch their software, however, it is urgent. This is exactly what has happened recently regarding the world’s most utilized Internet browser, Google Chrome.
COVID-19, or coronavirus, has been a major global health concern over the past couple of months. At this point, it is clear that this disease could have serious impacts on the workplace. We wanted to provide a brief rundown of good workplace and network health practices, as well as a few pointers on how you can handle health-based employee absences.
Intel has had publicity problems in the past, but now things are getting critical. An issue was reported that could potentially cause the processing power of their chips to diminish. What are being known as the Meltdown or Spectre vulnerabilities, have businesses scrambling around looking for ways to protect their data and infrastructure from what is seemingly an oversight that affects most of today’s CPU architectures; namely those that rely on virtual memory.
Have you ever heard the phrase zero-day threat? Basically, they are the scariest threats out there, because they are unaddressed and unresolved by the software developer, all while being actively exploited in the wild. This effectively gives the developer zero days to address the issue before it becomes a problem. Today, one of the most dangerous threats of the zero-day variety takes advantage of a weakness in Internet Explorer - but there is now a patch for it.