Twitter has officially rolled out its Twitter Blue program for an $8 monthly fee that confers upon the Tweeter multiple benefits, including the much-sought blue badge....
Here’s what a split Congress might mean for tech, cybersecurity and governance. One day after Tuesday’s midterm election, neither political party can yet claim control of...
In this interview for Help Net Security, Jason Oberg, CTO at Cycuity, talks about IoT devices cybersecurity, from production to usage, and how far have we come to securing...
The Emotet malware operation is again spamming malicious emails after almost a four-month “vacation” that saw little activity from the notorious cybercrime operation. Emotet is a malware...
Both voting systems and the voters themselves could be targets of malign influence. The 2020 election was successfully completed without any major disruptions, but that did...
Users often create weak and easily guessed passwords they reuse across systems and websites. As a result, traditional passwords are often the weakest link in the...
A set of four malicious applications currently available in Google Play, the official store for the Android system, are directing users sites that steal sensitive information...
In this interview for Help Net Security, James Turgal, VP of Cyber Risk, Strategy and Board Relations at Optiv, talks about election cybersecurity and how to keep elections and...
As cyberattacks have grown increasingly destructive, nations are entertaining the idea of responding to them with conventional military forces. It is difficult to determine how serious...
ConnectWise has fixed a critical vulnerability in ConnectWise Recover and R1Soft Server Backup Manager that could allow attackers to achieve remote code exection (RCE) or access confidential...