Google Drive is one of the most used cloud-based storage platforms, and due to its immense popularity and capabilities, it’s...
A team of researchers has developed a new open-source tool that can help automate the discovery of dangerous deserialization vulnerabilities in .Net applications. Named SerialDetector, the...
Claims by a respected German mathematician that the widely used RSA algorithm has been cracked by an advance in cryptoanalysis have received a respectful but cautious response. One-way...
A security vulnerability has been discovered in CIRA’s Canadian Shield iOS application – an app designed to protect Canadian users from malware and phishing. Canadian Shield, created by...
Under pressure to support a newly distributed workforce, organizations are rapidly migrating to the cloud. While this may be viewed as a leap forward for business, it...
The 2021 edition of the Electronic Security Expo (ESX), an annual education and networking event dedicated to professionals from the electronic security and life safety industry,...
The use of artificial intelligence (AI) in cybersecurity, while often overhyped, is not a new concept. Hackers have included countermeasures in malware since its inception to...
There has been a misconception about privacy that confuses many people. People tend to share seemingly related or unrelated personal information online, such as birthdays, address,...
Comments on draft documents required under the IoT Cybersecurity Improvement Act raise concerns of both fragmentation and a lack of flexibility. Time is up for the...
In a contentious nomination hearing, Colin Kahl called for a whole-of-government approach to technology. In between heated questions from Republican senators about tweets and arguments over...
The National Security Agency and Cybersecurity and Infrastructure Security Agency (CISA) released a cybersecurity information sheet, “Selecting a Protective DNS Service.” This publication details the benefits...
Recent Comments