Remove 2001 Remove Cybersecurity Remove Security
article thumbnail

South African telecom provider Cell C disclosed a data breach following a cyberattack

Security Affairs

The company founded in 2001 offers prepaid and postpaid mobile plans, data bundles and internet services, fiber broadband, roaming and international calling, SIM-only plans and device deals. ” Cell C has taken swift action to contain a recent cyberattack, secure its systems, and limit the impact. . ” states the company.

article thumbnail

Pharmaceutical giant Cencora discloses a data breach

Security Affairs

formerly known as AmerisourceBergen, is an American drug wholesale company and a contract research organization that was formed by the merger of Bergen Brunswig and AmeriSource in 2001. The company discovered the security breach on February 21 and immediately launched an investigation into the incident. Cencora, Inc.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

National Cybersecurity Alliance advocates ‘shared responsibility’ for securing the Internet

The Last Watchdog

Claire McCaskill by Russian intelligency agency hackers, as she runs for re-election, underscores the need for each individual and organization to take online privacy and security as a core part of our everyday lives. Related: Using ‘gamification’ for security training. A large retailer may spend millions on cyber security.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Achieving funding is no simple task, and cybersecurity entrepreneurs have a difficult path competing in a complex and competitive landscape. Luckily for cybersecurity startups, there’s no shortage of interest in tomorrow’s next big security vendors. Top Cybersecurity Venture Capital Firms. Table of Contents.

article thumbnail

Russians Shut Down Huge Card Fraud Ring

Krebs on Security

Cybersecurity experts say the raid included the charging of a major carding kingpin thought to be tied to dozens of carding shops and to some of the bigger data breaches targeting western retailers over the past decade. In 2006, Stroganov and an associate Gerasim Silivanon (a.k.a.

Retail 322
article thumbnail

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

The Last Watchdog

No one in cybersecurity refers to “antivirus” protection any more. The technology that corrals malicious software circulating through desktop PCs, laptops and mobile devices has evolved into a multi-layered security technology referred to as ‘endpoint security.’. Endpoint security is all about one-upmanship.

Security 174
article thumbnail

The strengths and weaknesses of different VPN protocols

Security Affairs

The protocol, though not perfect, allowed people to work from home through a secure internet connection. Even Microsoft recommends that people stay away from PPTP because, from a security standpoint where encryption is key, PPTP is extremely unsafe. That said, if your only concern is speed, then PPTP is the protocol for you.