Telecom Cyber Security

Data discovery to protect against cyber-attacks on telecommunications

Telecommunication companies are a primary target for malicious cyberattacks, given they operate an infrastructure widely used to communicate while simultaneously storing large amounts of sensitive data about their customers. Making matters worse, the telecoms industry continuously ranks among the worst in handling and fighting cybersecurity -- enabling attackers to gain access to personal, sensitive information…

Payment apps, can they be trusted?

The world is becoming more fast-paced with each passing day, and payment apps have become more common. In this new environment, technology is advancing quickly to meet the demands of individuals who need help achieve their daily tasks and long-term goals. Online payments are rapidly becoming one of our fastest evolving industries, aiming to make…

Hackers want to know what your sexual kinks are, and dating sites are telling them

If you are a frequent user of online dating platforms, be warned: the way they are getting relentlessly hacked, soon the only thing you’ll be kissing is your sensitive data goodbye. It’s no coincidence that popular dating sites, such as Ashley Madison, OkCupid, and BeautifulPeople.com are being constantly attacked by hackers. Private data really doesn’t…

Data breach of Verizon a grim reminder to us all: No one bulletproof

To your everyday man on the street, Verizon Communications is an American broadband and telecommunications company. But to those of us in the IT security line, Verizon is also one of the frontliners in the fight against cybercrime, responsible for helping many Fortune 500 companies respond to massive data breaches. But in a tragic turn…

Think your web browsers and phones are hack-proof? Think again.

If you like not getting hacked, bad news — pretty much nothing, from our web browsers to our operating systems, are hack-proof. In just the last week, white hat hackers have found exploits in nearly everything that we use to connect to the Internet.

Ransomware attacks on the rise: What are you doing to protect your business?

“We do not negotiate with terrorists”. Except, most of us have, or would. A relatively new breed of malware, dubbed “Ransomware”, is holding computer systems hostage and demanding payment for their safe release.   What’s surprising is that these underhanded tactics often see a payout for cyber criminals — according to one study, about 50%…

New Australian data breach laws set to bring unprepared companies down under

Snitches get stitches. It’s an old saying, indicating that tattling on others is a punishable offense. But starting as early as this year, Australian companies may have to start snitching on themselves if they suffer a data breach, and nurse the stitches that come along with it. New Australian data breach laws are currently being…

Taking out the titans — How hackers are beating the world's biggest companies

Does anyone still believe hackers are basement-dwelling nerds who stick their hard disks in microwaves the moment they hear a knock on their front door? Today’s hackers are organized, as skilled as they come, and creative. Apple’s App Store, long considered safer than Android’s Google Play Store, was confirmed to have been infected with malware…

Placeholder image

Could hackers be holding the key to nuclear launch weapons?

Most hackers breaching networks are looking to steal anything they can monetize, such as PII, cardholder data, or information they can sell. Other hackers just want to watch the world burn.

Soon-to-be ex-CEOs: Lose data in hacks, Get the axe.

The aftermath of the Ashley Madison hack that aired the details of its 37 million users has been anything but pretty. News of divorces, lawsuits, and even suicide relating to the hack are being reported on a daily basis, and in a completely understandable move, Ashley Madison’s parent company CEO no longer holds his title.…


Get our newsletters, as well as updates on the latest Ground Labs’ product features and insights on data discovery.