Security Pros Push for More Pervasive Threat Modeling
November 20 2020With the release of the "Threat Modeling Manifesto," a group of 16 security professionals hope to prompt more companies to consider the threats to software.
Read moreWith the release of the "Threat Modeling Manifesto," a group of 16 security professionals hope to prompt more companies to consider the threats to software.
Read moreDo you ever make, ahem, "pointed remarks" just before answering calls from people you would rather avoid?
Read moreA 21-year-old Irishman who pleaded guilty to charges of helping to steal millions of dollars in cryptocurrencies from victims has been sentenced to just under three years in prison....
Read moreCyberattacks are run like military attacks, in four main phases: reconnaissance, attack, exfiltration, and maintaining position. Understanding this makes fighting back easier.
Read more
Symantec is reporting on an APT group linked to China, named Cicada. They have been attacking organizations in Japan and elsewhere.
Cicada has historically been known to target Japan-linked...
Read more
Nearly a month after McAfee made its second appearance on the public market, the Virginia-based provider of security services to government and commercial organizations makes its own debut.
Read moreThe data breach began with a compromised employee email account.
Read moreWith so many people now connecting to business networks from home routers, ISP security takes on heightened importance. But is the security provided by ISPs good enough to be...
Read moreAttacks take advantage of popular services, including Google Forms and Google Docs.
Read moreThe popular Android app uses easily guessable Web addresses when users send private photos, videos, and voice messages.
Read more
Recent Comments