S3 Ep8: A conversation with Katie Moussouris [Podcast]
November 25 2020Here's the latest Naked Security Podcast - listen now!
Read moreHere's the latest Naked Security Podcast - listen now!
Read moreIn a lecture, Adam Shostack makes the case for a discipline of cyber public health. It would relate to cybersecurity in a similar way that public health relates to...
Read moreThe malware takes advantage of how the Windows command line interpreter works to try and slip past anti-detection tools, Huntress Labs says.
Read moreSeveral apps available on the Google Play Store, including two made by Chinese Internet giant Baidu, leaked information about the phone's hardware and location without the user's knowledge, research...
Read moreAs data exfiltration threats and bigger ransom requests become the norm, security professionals are advancing from the basic "keep good backups" advice.
Read moreThe agency urges shoppers to be cautious of fraudulent websites, unsolicited emails, and unencrypted financial transactions.
Read moreResearchers who last year hacked popular voice assistants with laser pointers take their work to the next level.
Read moreThe startup, founded by former white-hat hackers, has secured a $4 million seed round to close security gaps in cloud environments.
Read moreLeveraging the right response strategy, following the regulations, and understanding the ransom entity are the fundamentals in any ransomware outbreak.
Read moreChanges are coming to the privacy landscape, including more regulations and technologies.
Read more
Recent Comments