A few lines of code and two API calls is all that it takes for developers to add encryption to their applications, startup says.
Read moreAs Smartphones Become a Hot Target, Can Mobile EDR Help?
October 21 2020Lookout Security debuts a mobile endpoint detection and response offering that will integrate into its mobile security platform.
Read moreDealing With Insider Threats in the Age of COVID
October 21 2020Dangerous gray areas like new BYOD policies and shadow IT devices have increased, thanks to the rapid shift to remote working.
Read moreHow AI Will Supercharge Spear-Phishing
October 21 2020To keep pace with intelligent, unpredictable threats, cybersecurity will have to adopt an intelligent security of its own.
Read moreIASME Consortium to Kick-start New IoT Assessment Scheme
October 21 2020The IASME Consortium has been awarded a DCMS grant, enabling the UK organization to kick-start an Internet of Things (IoT) assessment scheme. IASME is looking for manufacturers interested in...
Read moreSeedworm Group, aka MuddyWater, is also deploying commodity ransomware as part of espionage attacks on companies and government agencies in the Middle East region.
Read moreAre You One COVID-19 Test Away From a Cybersecurity Disaster?
October 21 2020One cybersecurity failure can result in a successful ransomware attack or data breach that could cause tremendous damage. There's no need to panic, but neither is there time to...
Read moreChrome zero-day in the wild – patch now!
October 21 2020Exploitable bug in Chrome - patch now!
Read moreNSA Advisory on Chinese Government Hacking
October 21 2020
The NSA released an advisory listing the top twenty-five known vulnerabilities currently being exploited by Chinese nation-state attackers.
This advisory provides Common Vulnerabilities and Exposures (CVEs) known to be...
Read more
Attacks involving an unmanaged device and no malware expose gaps in cybersecurity that must be addressed.
Read more
Recent Comments