Impacted products include routers, IP cameras, DVRs, and smart TVs.
Read moreWith so many choices for encrypting data and communication, it's important to know the pros and cons of different techniques.
Read moreRATicate malware gang goes commercial
July 14 2020O, what tangled code we weave, when first we practise to deceive!
Read moreBad actors are on the lookout for ways to attack healthcare organizations, so it's important for cybersecurity pros to stay informed about the latest trends and threats in the...
Read moreThe average website includes content from 32 different third-party JavaScript programs, new study finds.
Read moreEnigma Machine for Sale
July 14 2020A four-rotor Enigma machine -- with rotors -- is up for auction....
Read moreBreached Data Indexer ‘Data Viper’ Hacked
July 13 2020Data Viper, a security startup that provides access to some 15 billion usernames, passwords and other information exposed in more than 8,000 website breaches, has itself been hacked and...
Read moreWith employees likely to continue to spend much, if not all, of their time working from home, companies are focusing more on technologies to boost the security of their...
Read moreA Paramedic’s Lessons for Cybersecurity Pros
July 13 2020A paramedic turned cybersecurity expert shares his experiences in both fields, highlights their similarities, and explains how they can learn from each other.
Read moreThese oft-forgotten devices contain serious vulnerabilities that allow attackers to hack OT systems remotely, researchers will reveal at Black Hat USA next month.
Read more
Recent Comments