ISO 27001 and ISO 27002 are international standards that provide a framework for managing information security within an organization. In...
Online voting is likely to become more popular as technology improves and as election officials seek ways to expand access to the ballot. But security experts...
Centris, a new tool developed by a global team of researchers from Korea University and the Georgia Institute of Technology, is designed to make the reuse...
US building contractor Hoffman Construction has gone public about a data breach that affected the healthcare records of an unspecified number of employees. Hoffman discovered in December that an unauthorized...
UPDATED SQLite has issued a security patch after the discovery of a use-after-free bug that, if triggered, could lead to arbitrary code execution or denial of service (DoS). The...
The Internal Revenue Service, state tax agencies and tax industry warned tax professionals of a new scam email that impersonates the IRS and attempts to steal...
SHAREit, an Android application which has been downloaded more than a billion times, contains unpatched security vulnerabilities that the app maker has failed to fix for more...
Malwarebytes, a provider of advanced endpoint protection and remediation solutions, announced the findings of its annual “State of Malware” report. The latest report explores how the global pandemic...
Every week there seems to be a news story about another massive data breach with millions—and sometimes billions—of records containing personal data lost or stolen. We...
Bottomline and Strategic Treasurer released the results of the 2021 Treasury Fraud & Controls Survey. This is the 6th annual survey between the long-time collaborators, whose research...
An executive order instructed the Commerce Department to produce profiles—plural—that sector-specific agencies could use to develop contractual language on the issue. The National Institute of Standards...
Recent Comments