AI is revolutionizing cybersecurity for both defenders and attackers as hackers, armed with the same weaponized technology, create a seemingly never-ending arms race. As artificial intelligence capabilities continue to...
Read moreUS-CERT Warns of ERP Application Hacking
July 26 2018ERP applications such as Oracle and SAP’s are open to exploit and under attack, according to a new report referenced in a US-CERT warning. Enterprise resource planning (ERP) applications...
Read moreUS-CERT Warns of ERP Application Hacking
July 26 2018ERP applications such as Oracle and SAP’s are open to exploit and under attack, according to a new report referenced in a US-CERT warning. Enterprise resource planning (ERP) applications...
Read moreIdentity theft protection firm LifeLock — a company that’s built a name for itself based on the promise of helping consumers protect their identities online — may have actually...
Read moreIdentity theft protection firm LifeLock — a company that’s built a name for itself based on the promise of helping consumers protect their identities online — may have actually...
Read moreThe ABCs of Hacking a Voting Machine
July 26 2018A hacker who successfully infiltrated a voting machine at last year’s DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later...
Read moreThe ABCs of Hacking a Voting Machine
July 26 2018A hacker who successfully infiltrated a voting machine at last year’s DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later...
Read moreCSO Online | Jul 25, 2018 Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses...
Read moreCSO Online | Jul 25, 2018 Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses...
Read more‘Password Check Required’? Not So Fast
July 26 2018The most successful phishing emails tell users to check their passwords or investigate security alerts. Hackers are exploiting their increasingly security-savvy targets by sending emails disguised with subject lines...
Read more
Recent Comments