Twitter Hacking for Profit and the LoLs
July 22 2020The New York Times last week ran an interview with several young men who claimed to have had direct contact with those involved in last week's epic hack against...
Read moreThe New York Times last week ran an interview with several young men who claimed to have had direct contact with those involved in last week's epic hack against...
Read moreThe agency brings in expertise from the private sector to improve its technical capabilities and engagement with industry partners.
Read moreThe APT group, known for its attack on Sony Pictures in 2014, has created an "advanced malware framework" that can launch and manage attacks against systems running Windows, MacOS,...
Read moreA series of newly discovered TCP/IP software vulnerabilities pose a threat to millions of IoT devices. Undiscovered since the early 1990s, they highlight the need to improve security in...
Read moreCOVID-19 as part of a cyberattack increased by more than 3,900% between February and June.
Read moreInformation security challenges are proving to be a huge barrier for the artificial intelligence ecosystem. Conversely, AI is causing headaches for CISOs. Here's why.
Read moreCybersecurity policy expert and attorney Camille Stewart explains how to dismantle systemic racism in the industry - and build a more diverse and representative workforce.
Read moreFawkes is a system for manipulating digital images so that they aren't recognized by facial recognition systems. At a high level, Fawkes takes your personal images, and makes tiny,...
Read moreHow does cybersecurity support business and society? The pandemic shows us.
Read moreVisibility into and inspection of inbound encrypted network traffic is essential for sound enterprise network security. Decryption approaches must soon change due to increasing cost and complexity, but alternative...
Read more
Recent Comments