How to Get One Step Ahead of Mobile Attacks
March 3 2022The advent of so-called "dropper" apps, which deliver and install malware that can also be later updated, is an emerging threat vector for mobile users.
Read moreThe advent of so-called "dropper" apps, which deliver and install malware that can also be later updated, is an emerging threat vector for mobile users.
Read moreAs BNPL platforms grow in popularity, experts warn that cybercriminals could target them using synthetic identity fraud and first-party fraud.
Read moreThe Linux Foundation and Harvard University create lists of the top 500 most popular open source projects, highlighting critical software that needs to be secured.
Read moreKey findings show API attack traffic grew at more than twice the rate of non-malicious traffic, and API security concerns are inhibiting innovation for two-thirds of organizations.
Read moreThe push to embrace Slack, Teams, and Zoom at work comes with new security risks for organizations.
Read moreA vulnerability in a Microsoft crypto library gives attackers a way to figure out what data is being encrypted in lockpicker-like fashion.
Read moreSoftware code pushed to online code repositories exposed twice as many secrets compared to last year, putting organizations' security at risk.
Read moreFPGAs can be part of physical systems in the aerospace, medical, or industrial fields, so a security compromise can be potentially serious.
Read moreWhy this is important: A business that surrounds itself with the same kind of people who work on the same projects will not generate new or original ideas.
Read more
Recent Comments