The National Security Agency released a cybersecurity product detailing how to detect and fix out-of-date encryption protocol implementations. Networks and systems that use deprecated forms of...
We have recently seen a growing trend toward protectionism by nations struggling to adapt to a twenty-first century of unprecedented interconnectedness. The Trump Administration’s “America First”...
Dr. Chase Cunningham, a recipient of Security magazine’s Most Influential People in Security, has joined Ericom as its Chief Strategy Officer. In this role, he will shape the company’s strategic...
The software supply chain attack against IT infrastructure vendor SolarWinds last year has served to revive interest in technologies that might mitigate against this kind of...
QR codes have a variety of uses, from storing bank information for payments to ordering at restaurants or joining a WiFi network. But the easy-to-use codes...
In the wake of the recent hack, Microsoft President Brad Smith said contractual obligations hurt cross-government sharing following breaches. Just as reports of hackers accessing government...
A security researcher has earned a $30,000 bug bounty payout after seizing control of Facebook and Oculus accounts via exploitation of a trio of security vulnerabilities. Owners of...
Security updates have been released for Node.js to address multiple vulnerabilities, including a memory corruption bug and a flaw that opened the door to HTTP request...
A security vulnerability in Google Docs allowed malicious hackers to take screenshots of private documents, a security researcher has found. Reported by Sreeram KL under the Google...
The SolarWinds hackers accessed portions of Microsoft’s source code, the software giant admitted last week. The latest results of an ongoing investigation by Microsoft revealed that the sophisticated...