Educational technology is critical but can come at huge costs to student and teacher privacy and security. Are those costs too high?High-value users...
In a world that isn't private by design, security and liability implications for US-based cloud companies are huge.When the European Court of Justice...
Cybercrime increasingly is turning into a commodity. Stolen PII data and hijacked cloud accounts especially propel the spread, research shows.The key commodities prices...
Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2020-7029PUBLISHED: 2020-08-11
A Cross-Site Request Forgery (CSRF) vulnerability was discovered in the System Management Interface Web component of...
A security leader shares tips for adopting a CISO mindset, creating risk management strategies, and "selling infosec" to IT and executives.Modern security leaders...
Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2020-9079PUBLISHED: 2020-08-11FusionSphere OpenStack 8.0.0 have a protection mechanism failure vulnerability. The product incorrectly uses a protection mechanism....
Distributed denial-of-service attacks have stayed consistently high throughout 2020, a shift from normal attack trends that researchers attribute to COVID-19.The number of distributed denial-of-service (DDoS)...
Three fundamental technologies -- chatbots, audio fakes, and deepfake videos -- have improved to the point that creating digital, real-time clones of people...
Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2020-15058PUBLISHED: 2020-08-07Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same...
Security researchers found hundreds of pieces of vulnerable code in the Qualcomm Snapdragon chips powering Android phones.Security researchers have discovered more than 400...