Blog: In The News
You are here: Home \ Blog
Half of breached firms say they were compromised due to a vulnerability for which a patch was available but not applied.
Threatpost editors Tom Spring, Lindsey O’Donnell and Tara Seals preview Black Hat USA and DEF CON 2018, which both take place this week in Las Vegas.
Security experts aren’t happy after Fortnite’s creator, Epic Games, announced it would not go through Google Play.
A massive proxy botnet is just the tip of the iceberg, a warning sign of a bigger operation in the works by the Ramnit operators.
Production lines were halted for two days, and the effects to the global supply chain for mobile phones could be felt for the third quarter and beyond.
Ancestry, MyHeritage and others have committed to a policy framework for the collection, protection, sharing and use of consumer genetic data.
Potentially impacted customers include organizations like Aldo, Dunkin Donuts, GE, HauteLook, Nestle Waters, News Corp Australia and Sony.
Top IT security barriers cited by respondents include budget constraints, and limited time to research and understand new threats.
Spam is back with a vengeance, thanks to the demise of attack vectors such as Adobe Flash.
Phishing emails purported to be commercial offers – but were really installing remote administration software on victims’ systems.
... 8910111213141516 ... 18 ... 27 ... 36 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ... 135 ... 144 ... 153 ... 162 ... 171 ... 180 ... 189 ... 198 ... 207 ... 216 ... 225 ... 234 ... 243 ... 252 ... 261 ...