The recent spread of the distributed denial-of-service tool attempts to exploit a dozen web-framework flaws, uses credential stuffing, and is intended to work against a variety of operating systems.
Read moreKernel driver bugs often let crooks take over your entire system from even the weediest foothold.
Read moreAdvanced persistent threat (APT) campaign aims to steal intelligence secrets from foreign companies operating in China.
Read moreAnalyzing IoT Security Best Practices
June 25 2020New research: "Best Practices for IoT Security: What Does That Even Mean?" by Christopher Bellman and Paul C. van Oorschot: Abstract: Best practices for Internet of Things (IoT) security...
Read moreTwitter emailed business clients to tell them that their financial data may have been seen by the uninvited.
Read moreApple Buys Fleetsmith
June 24 2020The fleet management company becomes part of Apple in a deal announced today.
Read moreNo Internet Access? Amid Protests, Here’s How to Tell Whether the Government Is Behind it
June 24 2020Government-mandated Internet shutdowns occur far more regularly than you might expect.
Read moreAverage Cost of a Data Breach: $116M
June 24 2020Sensitivity of customer information and time-to-detection determine financial blowback of cybersecurity breaches.
Read moreCOVID-19 Risks of Flying
June 24 2020I fly a lot. Over the past five years, my average speed has been 32 miles an hour. That all changed mid-March. It's been 105 days since I've been...
Read moreAnnual "Black Hat USA Attendee Survey" indicates unprecedented concern over possible compromises of enterprise networks and US critical infrastructure.
Read more
Recent Comments