Zephyrnet Logo

Cyber Security

Is Edtech the Greatest APT?

Educational technology is critical but can come at huge costs to student and teacher privacy and security. Are those costs too high?High-value users...

EU-US Privacy Shield Dissolution: What Happens Next?

In a world that isn't private by design, security and liability implications for US-based cloud companies are huge.When the European Court of Justice...

How to Help Spoil the Cybercrime Economy

Cybercrime increasingly is turning into a commodity. Stolen PII data and hijacked cloud accounts especially propel the spread, research shows.The key commodities prices...

17 Essential Stats About the State of Consumer Privacy

Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2020-7029PUBLISHED: 2020-08-11 A Cross-Site Request Forgery (CSRF) vulnerability was discovered in the System Management Interface Web component of...

Gamifying Password Training Shows Security Benefits

When picking passwords, users often fall back on certain insecure patterns, but good habits can be learned using simple games, a group of...

Hacking It as a CISO: Advice for Security Leadership

A security leader shares tips for adopting a CISO mindset, creating risk management strategies, and "selling infosec" to IT and executives.Modern security leaders...

Better Business Bureau Warns of New Visa Scam

Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2020-9079PUBLISHED: 2020-08-11FusionSphere OpenStack 8.0.0 have a protection mechanism failure vulnerability. The product incorrectly uses a protection mechanism....

Q2 DDoS Attacks Triple Year Over Year: Report

Distributed denial-of-service attacks have stayed consistently high throughout 2020, a shift from normal attack trends that researchers attribute to COVID-19.The number of distributed denial-of-service (DDoS)...

Vulnerability Prioritization: Are You Getting It Right?

Developers must find a way to zero in on the security vulns that present the most risk and quickly address them without slowing...

Digital Clones Could Cause Problems for Identity Systems

Three fundamental technologies -- chatbots, audio fakes, and deepfake videos -- have improved to the point that creating digital, real-time clones of people...

Reddit Attack Defaces Dozens of Channels

Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2020-15058PUBLISHED: 2020-08-07Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same...

400+ Qualcomm Chip Vulnerabilities Threaten Millions of Android Phones

Security researchers found hundreds of pieces of vulnerable code in the Qualcomm Snapdragon chips powering Android phones.Security researchers have discovered more than 400...

Latest Intelligence

spot_img
spot_img