Even as more code is produced, indirect dependencies continue to undermine security.
Read moreMalicious botnet sources explode in new attacks that push boundaries in terms of volume and duration.
Read moreBetter Collaboration Between Security & Development
June 25 2020Security and development teams must make it clear why their segment of the development life cycle is relevant to the other teams in the pipeline.
Read moreThe recent spread of the distributed denial-of-service tool attempts to exploit a dozen web-framework flaws, uses credential stuffing, and is intended to work against a variety of operating systems.
Read moreKernel driver bugs often let crooks take over your entire system from even the weediest foothold.
Read moreAdvanced persistent threat (APT) campaign aims to steal intelligence secrets from foreign companies operating in China.
Read moreAnalyzing IoT Security Best Practices
June 25 2020New research: "Best Practices for IoT Security: What Does That Even Mean?" by Christopher Bellman and Paul C. van Oorschot: Abstract: Best practices for Internet of Things (IoT) security...
Read moreTwitter emailed business clients to tell them that their financial data may have been seen by the uninvited.
Read moreApple Buys Fleetsmith
June 24 2020The fleet management company becomes part of Apple in a deal announced today.
Read moreNo Internet Access? Amid Protests, Here’s How to Tell Whether the Government Is Behind it
June 24 2020Government-mandated Internet shutdowns occur far more regularly than you might expect.
Read more
Recent Comments