The Federal Communications Commission is already set to vote on a notice of proposed rulemaking on its equipment authorization program. Congress and the Federal Communications Commission...
Gateley, the UK-based legal and professional services group, has revealed that client data was accessed during a cyber-attack. In a security alert published yesterday (June 16), the company said...
A vulnerability in the Peloton Bike+fitness machine has been fixed that could have allowed a threat actor to gain complete control over the device, including its...
A vulnerability in Microsoft Teams could allow a malicious actor to steal sensitive data and access a victim’s communications, researchers have warned. The bug, which has now been...
Global research commissioned by Versa Networks examining the adoption of Secure Access Service Edge (SASE) by businesses during the lockdown revealed that the adoption of SASE has skyrocketed...
Stop us if you’ve heard this one before: A laptop is stolen and the theft results in the owner’s personal data being accessed by a threat...
Google has released a set of coding utilities that allow fully homomorphic encryption (FHE) operations on encrypted data. The open source collection of libraries and tools allow computational processes to...
The Twitter hashtag #cisotips has been greeted by derision from the hacker community after a spoof tweet mocking bad infosec advice went viral. It came after @LiveOverflow, aka...
A broad spectrum of organizations are calling on regulators to improve suppliers instead of simply banning foreign companies. The Pacific Northwest National Laboratory recommends the Energy...
A new strategy asks social media and communications companies to enforce their own policies to protect users from those who foment violence. The Biden administration is...