By Corey Nachreiner, CSO at WatchGuard Technologies Do you remember Coinbase’s mysterious Super Bowl ad? The moving QR code on a plain black background with no other information was intended to make viewers curious and lure them into scanning the QR code.  While this might have been a clever marketing idea, […]

Cybersecurity Ramifications of Mainstream QR/AR Codes


Apps are Increasingly Crucial to Businesses, But Their Security Remains Underfunded. By Peter R. Kelley In “The State of Mobile App Security in 2022,” Osterman Research and mobile app API experts Approov reveal significant vulnerabilities and security concerns with production mobile apps, and in particular, with the APIs that these […]

Mobile Apps: Open for Business, Open to Attack


By Jeff Broth Over the past decade, the fields of cybersecurity and hacking have developed at incredible rates, much in response to one another. Whenever there is a major breakthrough within hacking communities that starts to show up around the world, it is similarly defended against, with the world’s cybersecurity […]

Where Does Breach and Attack Simulation Come From?



High-growth security awareness training and behavior modification company offers channel partners the best opportunities to keep their clients safe from cyberattacks. LOS ANGELES, CA (July 13, 2022) — Leading security awareness training (SAT) company NINJIO is announcing the launch of its NINJIO Partner Program, which will give integrators, consultancies, value-added […]

NINJIO Partner Program Enables Solution Providers to Deliver Cybersecurity Behavior ...


By Devin Partida, Editor-in-Chief, ReHack.com Cybersecurity is a growing concern with new technology. We can streamline processes using technology, but sometimes personal information can be leaked. Online safety is more important than ever as transportation becomes more connected. Here are a few reasons why cybersecurity is essential and how to implement […]

Do We Need to Increase Cybersecurity in Transportation?


Cybercriminals have ramped up their attacks on Ukrainian citizens in the wake of the Russian invasion of Ukraine. According to a new blog post from The Media Trust, there has been a five-fold increase in malware targeting Ukrainian consumers since the start of the conflict. “The writing was on the […]

Ukraine Consumers See 5X Increase in Malware Targeting



By Emily Newton, Editor-in-Chief at Revolutionized Magazine Wearable technology has become a familiar part of everyday life. These items have thrived in consumer segments and are starting to break into commercial markets, too. Wearables in the workplace are becoming increasingly common. As many as 21% of American adults regularly wear a […]

Best Practices for Wearables in the Workplace You Need to ...


By Cate Orlina at SafetyCulture Biometric data collection is collecting fingerprints, palm prints, iris scans, and facial recognition to verify a person’s identity. Digital biometric data has been around since the early 1990s and can be applied to almost any aspect of daily life. Biometric technology has grown exponentially in […]

Biometric Data Collection Today: Where We Are, and Where We’re ...


By Zachary Amos, Features Editor at ReHack There isn’t just one Internet of Things — there are many. A soft-drink factory might have its own IoT, while a high-rise office building might have another. Residences might have one, too. The most visible IoT innovations — smart lighting, appliances, and sensors — […]

As IoT Expands Into Retail, Cybersecurity Risks Rise



By Pratik Kirve, Team Lead – Content Writing at Allied Market Research The cybersecurity scenario is changing year after year. Every year presents new challenges and opportunities. This year is no exception and a few trends are taking place to ensure the security of devices, systems, and networks. With cyber-criminals […]

Five Key Cybersecurity Trends Taking Place in 2022


By Theo Zafirakos, CISO Terranova Security Three billion phishing emails are sent globally every day.  That’s right. Billion. These emails are a serious threat. Organizations must be constantly vigilant because if employees don’t know how to spot phishing emails, your organization’s information is at risk. Knowing how to build a […]

How to Build a Successful Phishing Simulation Campaign


By Emily Newton, Editor-in-Chief at Revolutionized Magazine Hackers are employing new techniques to compromise data centers, including power attacks. These hacks target a server’s power consumption and center power infrastructure. This attack method could significantly damage data center equipment, lead to lengthy outages or make valuable information easier to acquire. The […]

How to Protect Data Centers From a Power Attack