8 Security Tips for a Hassle-Free Summer Vacation
June 24 2018It’s easy to let your guard down when you’re away. Hackers know that, too. Image Source: Shutterstock via studiostoks It’s easy to let your security guard down when you’re...
Read moreIt’s easy to let your guard down when you’re away. Hackers know that, too. Image Source: Shutterstock via studiostoks It’s easy to let your security guard down when you’re...
Read moreThe Executive Office of the President isn’t complying with the DMARC protocol, but that has fewer implications than some headlines would suggest. This year, US agencies rushed to implement...
Read moreResearchers at Black Hat USA will show how vulnerabilities in Microsoft’s Cortana highlight the need to balance security with convenience. Security vs. convenience is a delicate balance to strike...
Read moreThe U.S. Supreme Court today ruled that the government needs to obtain a court-ordered warrant to gather location data on mobile device users. The decision is a major development...
Read moreA new exploit of a known vulnerability gives an attacker control of the Drupal-hosting server. A newly discovered vulnerability in Drupal has been exploited to turn infected systems into...
Read moreSophos warns of a ‘protection racket’ scam email that threatens to infect victims with the ransomware variant if they don’t pay the attackers. A widespread new email scam purportedly...
Read moreA glimpse into how two new products for intrusion detection and entity resolution are using AI to help humans do their jobs. Machine learning, advanced heuristics, or artificial intelligence:...
Read moreMore than 90 percent of respondents in a Tripwire survey in Europe expect attacks by state-sponsored threat actors to increase in the next 12 months. Incidents like last year’s...
Read moreThe SANS Institute provides training related to cybersecurity and the safe use of technology within your organization. To provide this training, the SANS Institute captures and processes personal data...
Read moreA series of newly disclosed vulnerabilities could allow an attacker to gain control of industrial switches. Phoenix Contact has disclosed four vulnerabilities in switches in the FL SWITCH industrial...
Read more
Recent Comments