New users and monetization methods are increasingly profitable for gaming industry, but many companies find they have to stem growth in cheats, hacks, and other fraud to keep customers...
Read moreHow Development Teams Should Respond to Text4Shell
November 24 2022Yet another *4Shell exploit highlights the horror of strange visitors into enterprise environments. This Tech Tip focuses on what to do next.
Read moreWhy Africa’s Telecoms Must Actively Collaborate to Combat Fraud
November 24 2022Unique conditions contribute to outsized telecom fraud across the continent, but working together can bring solutions.
Read more‘Patch Lag’ Leaves Millions of Android Devices Vulnerable
November 24 2022Months after a fix was issued by a vendor, downstream Android device manufacturers still haven't patched, highlighting a troubling trend.
Read moreThe infostealer Aurora’s low detection rates and newcomer status are helping it fly under the radar, as more cybercriminal gangs target cryptocurrency wallets and communications apps.
Read moreChinese threat actors have already used the vulnerable and pervasive Boa server to infiltrate the electrical grid in India, in spate of malicious incidents.
Read moreFueling the trend are the rising adoption of cloud computing solutions, technology advancements, stricter data safety regulations, and the move to digitalization.
Read moreWhere Are We Heading With Data Privacy Regulations?
November 23 2022New laws have made the current US privacy landscape increasingly complex.
Read moreCybersecurity Pros Put Mastodon Flaws Under the Microscope
November 23 2022As the open source social media network blows up due to Twitter's troubles, researchers caution about vulnerabilities within the application.
Read more
Recent Comments