Biometrics in the Great Beyond
May 14 2020A thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee’s death? As Kacey Clark,...
Read moreA thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee’s death? As Kacey Clark,...
Read moreWhile some users are up to speed with the WFH protocol, it’s worth adding a few more items to your security checklist. There’s good news and bad news as...
Read moreThis marks the third month in a row that Microsoft patched more than 100 bugs, of which 16 are classified as critical. Microsoft today released fixes for 111 vulnerabilities...
Read moreMicrosoft today issued software updates to plug at least 111 security holes in Windows and Windows-based programs. None of the vulnerabilities were labeled as being publicly exploited or detailed...
Read moreThreat actors have pivoted from noisy attacks to intrusions where stealth and ROI are primary goals, new report says. Threat actors are pivoting away from noisy website attacks to...
Read moreUsing a known exploit to infect unmaintained systems, the WannaCry ransomware worm remains a study in preventable catastrophes. Yet many companies continue to ignore its lessons. Three years ago,...
Read moreUsing a known exploit to infect unmaintained systems, the WannaCry ransomware worm remains a study in preventable catastrophes. Yet many companies continue to ignore its lessons. Three years ago,...
Read moreHow governments can protect personal privacy in contact tracing while saving peoples’ lives When Jean-Jacques Rousseau wrote The Social Contract in 1762, he argued that only humans possess sovereign...
Read moreAttackers with physical access to targeted machines could exploit these flaws to access and copy data within minutes, researchers say. Security researchers have discovered Thunderbolt vulnerabilities that could leave...
Read more
Recent Comments