At many organizations, the attitude to securing software appears to be throwing a lot of technology at the problem, a new study finds. New research suggests that the strategy...
Read moreAt many organizations, the attitude to securing software appears to be throwing a lot of technology at the problem, a new study finds. New research suggests that the strategy...
Read moreiTunes Zero-Day Exploited to Deliver BitPaymer
October 11 2019The ransomware operators targeted an “unquoted path” vulnerability in iTunes for Windows to evade detection and install BitPaymer. Ransomware operators have been seen exploiting a zero-day vulnerability in iTunes...
Read moreiTunes Zero-Day Exploited to Deliver BitPaymer
October 11 2019The ransomware operators targeted an “unquoted path” vulnerability in iTunes for Windows to evade detection and install BitPaymer. Ransomware operators have been seen exploiting a zero-day vulnerability in iTunes...
Read moreHow to Think Like a Hacker
October 11 2019In the arms race of computer security, it’s never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be...
Read moreHow to Think Like a Hacker
October 11 2019In the arms race of computer security, it’s never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be...
Read moreUSB Drive Security Still Lags
October 10 2019While USB drives are frequent pieces of business hardware, a new report says that one-third of US businesses have no policy governing their use. Though nearly nine out of...
Read moreUSB Drive Security Still Lags
October 10 2019While USB drives are frequent pieces of business hardware, a new report says that one-third of US businesses have no policy governing their use. Though nearly nine out of...
Read moreSecurity Tool Sprawl Reaches Tipping Point
October 10 2019How a new open source initiative for interoperable security tools and a wave of consolidation could finally provide some relief for overwhelmed security analysts and SOCs. The typical security...
Read more
Recent Comments