Why hack into a server when you can just send vistors to a fake alternative instead?
Read moreApplying the 80-20 Rule to Cybersecurity
July 7 2020How security teams can achieve 80% of the benefit for 20% of the work.
Read moreIoT Security Principles
July 7 2020The BSA -- also known as the Software Alliance, formerly the Business Software Alliance (which explains the acronym) -- is an industry lobbying group. They just published "Policy Principles...
Read moreIt's a short jump from a Rolls Royce ride to extradition from the UAE. Goodbye, Dubai, goodbye, Palazzo Versace, hello, Chicago jail cell.
Read moreThe two extraditions of business email compromise attackers indicate a step forward for international law enforcement collaboration.
Read moreThe US Cybersecurity and Infrastructure Security Agency encourages organizations to patch a critical flaw in the BIG-IP family of application delivery controllers, as firms find evidence that attackers are...
Read moreSince at least May 2019, the state-sponsored threat actor has stolen card data from dozens of retailers, including major US firms.
Read moreThe payment-card skimmer targets websites hosted on Microsoft IIS servers and running the ASP.NET web framework.
Read moreAndroid Adware Tied to Undeletable Malware
July 6 2020Adware on inexpensive Android smartphone can carry additional malware and be undeletable.
Read moreHow to Assess More Sophisticated IoT Threats
July 6 2020Securing the Internet of Things requires diligence in secure development and hardware design throughout the product life cycle, as well as resilience testing and system component analysis.
Read more
Recent Comments