The tech community should unite to develop and distribute a universal COVID-19 contact-tracing application. Here's why and how.As governments around the world cope...
A phishing email allowed an attacker to compromise a SANS employee's email environment, the organization reports.Cybersecurity training firm SANS has confirmed a data...
By looking at security testing capacity, staff expertise, and risks throughout the software supply chain, application security teams can improve their overall effectiveness....
Black Hat talk expands on research that uncovered more weaknesses in Wi-Fi chips allowing for the unauthorized decryption of traffic.Earlier this year, two...
Goal was to see if computer-generated images that look like one person would get classified as another person.Neural networks powered by recent advances...
The August 2020 Patch Tuesday marks the sixth month in a row Microsoft released patches for more than 110 vulnerabilities.Microsoft today released fixes...
As companies "shift left" -- pushing more responsibility for security onto developers -- the tools that are available are falling short, usability researchers...
Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2020-7029PUBLISHED: 2020-08-11
A Cross-Site Request Forgery (CSRF) vulnerability was discovered in the System Management Interface Web component of...
A security researcher demonstrated multiple vulnerabilities, two of which could let an attacker read and steal user data.Zoom has patched multiple vulnerabilities discovered...
Educational technology is critical but can come at huge costs to student and teacher privacy and security. Are those costs too high?High-value users...
In a world that isn't private by design, security and liability implications for US-based cloud companies are huge.When the European Court of Justice...