A million sites attacked by 20,000 different computers.
Read moreLong-term business needs -- and the ethical implications that result -- don't simply go away just because we're navigating a global health crisis.
Read moreI just published a new paper with Karen Levy of Cornell: "Privacy Threats in Intimate Relationships." Abstract: This article provides an overview of intimate threats: a class of privacy...
Read moreResearchers say Tycoon ransomware, which has targeted software and educational institutions, has a few traits they haven't seen before.
Read moreThe campaigns have been part of the overall increase in coronavirus-related malware activity.
Read moreHow data sharing, innovation, and regulatory standardization can make it easier for organizations to both contribute and consume critical threat intelligence.
Read moreApparently, some people consider their passwords "invincible", even after a data breach. Don't be those people.
Read moreA new report examines attacker methodologies to better understand how exploit testing is conducted in the wild.
Read moreCould Automation Kill the Security Analyst?
June 4 2020Five skills to ensure job security in the Age of Automation.
Read moreAttackers hacked and encrypted the computers of a contractor whose clients include the US military, government agencies and major military contractors.
Read more
Recent Comments