Law enforcement recovered two decades’ worth of stolen material from the home and car of former government contractor Harold Martin. A US district judge has sentenced former government contractor...
Read moreA Password Management Report Card
July 22 2019New research on password management tools identifies the relative strengths and weaknesses of 12 competing offerings. The phrase “password management” engenders similar reactions from both those responsible for cybersecurity...
Read moreA Password Management Report Card
July 22 2019New research on password management tools identifies the relative strengths and weaknesses of 12 competing offerings. The phrase “password management” engenders similar reactions from both those responsible for cybersecurity...
Read moreSprint Reveals Account Breach via Samsung Website
July 22 2019The last-June breach exposed data including names, phone numbers, and account numbers. Sprint has been informing customers of a data breach discovered on June 22 that came by way...
Read moreSprint Reveals Account Breach via Samsung Website
July 22 2019The last-June breach exposed data including names, phone numbers, and account numbers. Sprint has been informing customers of a data breach discovered on June 22 that came by way...
Read moreCalculating the Value of Security
July 22 2019What will it take to align staff and budget to protect the organization? As much as we’d like to think things have changed in the wake of WannaCry, NotPetya,...
Read moreCalculating the Value of Security
July 22 2019What will it take to align staff and budget to protect the organization? As much as we’d like to think things have changed in the wake of WannaCry, NotPetya,...
Read moreThese competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields. As cyberattacks become more sophisticated and network complexity increases, there are...
Read moreThese competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields. As cyberattacks become more sophisticated and network complexity increases, there are...
Read moreBulgarian Tax Breach Nets All the Records
July 21 2019An attack by a ‘wizard hacker’ results in leaked records for virtually every Bulgarian taxpayer. A hacker hit Bulgaria’s NRA tax agency and gained access to the tax records...
Read more
Recent Comments