How to Get One Step Ahead of Mobile Attacks
March 3 2022The advent of so-called "dropper" apps, which deliver and install malware that can also be later updated, is an emerging threat vector for mobile users.
Read moreThe advent of so-called "dropper" apps, which deliver and install malware that can also be later updated, is an emerging threat vector for mobile users.
Read moreLatest episode - listen now (or read it, if that's your preference)...
Read morePangu Lab in China just published a report of a hacking operation by the Equation Group (aka the NSA). It noticed the hack in 2013, and was able to...
Read moreAs BNPL platforms grow in popularity, experts warn that cybercriminals could target them using synthetic identity fraud and first-party fraud.
Read moreThe Linux Foundation and Harvard University create lists of the top 500 most popular open source projects, highlighting critical software that needs to be secured.
Read moreThe push to embrace Slack, Teams, and Zoom at work comes with new security risks for organizations.
Read moreKey findings show API attack traffic grew at more than twice the rate of non-malicious traffic, and API security concerns are inhibiting innovation for two-thirds of organizations.
Read moreA vulnerability in a Microsoft crypto library gives attackers a way to figure out what data is being encrypted in lockpicker-like fashion.
Read moreSoftware code pushed to online code repositories exposed twice as many secrets compared to last year, putting organizations' security at risk.
Read moreFPGAs can be part of physical systems in the aerospace, medical, or industrial fields, so a security compromise can be potentially serious.
Read more
Recent Comments