Telangana state government took over three months to protect sensitive details of its employees and pensioners from its website. The Indian Computer Emergency Response Team (CERT-In)...
Recently, researcher Xianbo Wang from Hong Kong has presented his findings at Black Hat Europe, exploring fingerprint-jacking, a user interface-based attack that targets fingerprints scanned into Android apps....
If you were in an IT-related field 10 years ago, the term “Shadow IT” might strike fear into your heart. In case you missed it –...
At the onset of the pandemic, while many people were beginning to work from home, we conducted a survey to learn about remote work and employee...
An end to the “dual hat” arrangement has been debated for years — but the timing raises questions. The plan requires Milley’s certification to move ahead....
Attackers can bypass password checks in applications that use Bouncy Castle’s OpenBSDBcrypt class because of recently discovered cryptographic mistakes in the widely used encryption library. The authentication bypass vulnerability (CVE-2020-28052) was discovered...
A team of security researchers has developed a DIY appliance to detect stalkerware and other malware on smartphones. TinyCheck is open source software designed to be...
Nearly two-thirds (64%) of business decision makers expect their company to face a rise in COVID-19 themed phishing attacks in 2021, according to a new study...
FILE PHOTO: Acting Head of the Security Service of Ukraine (SBU) Ivan Bakanov nominated to become new head of Security Service, delivers a speech during the...
Cloudhouse Technologies, a London, UK-based provider of application compatibility packaging solutions, acquired UpGuard Core, from third-party risk and attack surface management platform UpGuard Inc. UpGuard Core...