Name That Toon: Modern-Day Fable
July 18 2022Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreFeeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreWhen it comes to cybersecurity, ask not what everyone else can do for you...
Read moreFor the past seven years, an online service known as 911 has sold access to hundreds of thousands of Microsoft Windows computers daily, allowing customers to route malicious traffic...
Read moreTelecom and business services see the highest level of attacks, but the two most common ransomware families, which continue to be LockBit and Conti, are seen less often.
Read moreSome sites, including Facebook, add parameters to the web address for tracking purposes. These parameters have no functionality that is relevant to the user, but sites rely on...
Read moreHow a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.
Read moreShort video. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
Read moreThe latest Jan. 6 committee hearing on Tuesday examined the role of conspiracy theory communities like 8kun[.]top and TheDonald[.]win in helping to organize and galvanize supporters who responded to...
Read moreIT asset tracker and auditor software has a critical issue with insecure object deserialization that could allow threat actors to execute code, researchers say.
Read moreAs more employees plan on taking longer holidays and working remotely from the destination for part of that time, organizations have to consider the risks. Like Wi-Fi networks.
Read more
Recent Comments