Deep-dive study unearthed security flaws that could allow remote code execution, file manipulation, and malicious firmware uploads, among other badness.
Read moreAI Is Not a Security Silver Bullet
June 21 2022AI can help companies more effectively identify and respond to threats, as well as harden applications.
Read moreOpen Source Software Security Begins to Mature
June 21 2022Only about half of firms have an open source software security policy in place to guide developers in the use of components and frameworks, but those that do exhibit...
Read moreTwo bills attempting to reduce the power of Internet monopolies are currently being debated in Congress: S. 2992, the American Innovation and Choice Online Act; and S. 2710,...
Read moreAfter bragging in underground forums, the woman who stole 100 million credit applications from Capital One has been found guilty.
Read moreFeds Take Down Russian ‘RSOCKS’ Botnet
June 20 2022RSOCKS commandeered millions of devices in order to offer proxy services used to mask malicious traffic.
Read moreFriends don't let friends get scammed. Not everyone knows how typical scams unfold, so here are some real-world examples...
Read moreWhy Paper Receipts are Money at the Drive-Thru
June 20 2022Check out the handmade sign posted to the front door of a shuttered Jimmy John's sandwich chain shop in Missouri last week. See if you can tell from the...
Read moreName That Toon: Cuter Than a June Bug
June 20 2022Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreA Kremlin spokesman said that the St. Petersburg International Economic Forum accreditation and admissions systems were shut down by a DDoS attack.
Read more
Recent Comments