Other large tech companies also have considerable control over customers’ devices and insight into their data. Apple’s plan to scan customers’ phones and other devices for images depicting...
Adversaries take advantage of moments in real time, such as when efforts are focused on withdrawing from Afghanistan. Disinformation and malign influence online are among nascent...
Walmart Inc., one of the world’s largest retailers, was at the center of a hoax aimed at manipulating the price of Litecoin, a peer-to-peer cryptocurrency and...
Questions leaders can use to measure organization’s ransomware preparedness The vast majority (86.7%) of C-suite and other executives say they expect the number of cyberattacks targeting their...
Apple has released an emergency software patch to plug a security hole Citizen Lab researchers discovered affecting all its operating systems, exploited to infect the iPhone...
Microsoft has released a security update to fix the last remaining PrintNightmare zero-day vulnerabilities that allowed attackers to gain administrative privileges on Windows devices quickly. In...
A potentially troublesome set of web security vulnerabilities in Speer were promptly resolved after the researcher who unearthed the flaws notified its developer. Speer is an open...
A critical vulnerability in certain Matrix clients could allow an attacker access to encrypted messages. Users of the open source, decentralized communications platform are urged to update their...
Medical tech multinational Olympus has sought to reassure customers that its services are running normally following a cyber-attack that prompted the shutdown of certain IT systems last week....
Agency leadership stressed Kiersten Todt’s experience working with the private sector. The Cybersecurity and Infrastructure Security Agency has a new chief of staff—Kiersten Todt—with a long...