Blog: In The News
You are here: Home \ Blog
A member of law enforcement acknowledged at SOURCE Boston that the lack of communication around ransomware remains a serious problem.
Starting with Chrome 62, Google will start marking any HTTP page where users may enter data, and any HTTP page visited in incognito mode
Source Boston keynoter Keren Elazari sounded a call to action for industry to extend an acceptance of hackers.
As Microsoft hardens its defenses with tools such as Control Flow Guard, researchers at Endgame are preparing for the reality of Counterfeit Object-Oriented Programming attacks to move from theoretical to real.
The Hack the Air Force bug bounty program invites white hats from inside and outside the U.S. to hack its websites.
At Source Boston, Josh Corman of the Atlantic Council said that healthcare is suffering from a lack of security talent, devices rife with vulnerabilities, and government incentivizing bad behavior.
A trove of consumer auto loan data—some 1 million records—has been locked down after a researcher found an exposed and accessible database online.
Atlassian reset user passwords for its group chat service HipChat on Monday following an incident that may have resulted in unauthorized access to a server used by the service.
Nearly two-thirds of servers and PCs peddled on the xDedic underground marketplace belong to schools and universities based in United States.
Adobe released an important security hotfix for several versions of Coldfusion, resolving two bugs, Tuesday morning.
... 101102103104105106107108109 ... 117 ... 126 ... 135 ... 144 ... 153 ... 162 ... 171 ... 180 ... 189 ... 198 ... 207 ... 216 ... 225 ... 234 ... 243 ... 252 ... 261 ...