An analysis projects the hypothetical disruption a cyberattack from a quantum computer could have on global financial markets. The continued...
An Internet Explorer zero-day vulnerability has been discovered used in recent North Korean attacks against security and vulnerability researchers. Last month, Google disclosed that the North...
The modern IT organization has a wide variety of responsibilities and competing priorities. As a result, cybersecurity is often overlooked in favor of projects that have an immediate...
Belgian cybersecurity researcher Polle Vanhoof just published a fascinating and well-written paper about an exploitable hole he found in the payment system used in some Nespresso prepaid coffee...
The agency ordered SkyMed International to shore up its information security practices. Travel services company SkyMed International Inc. agreed to design, implement and maintain an information...
Officials described their goals as they begin implementing the DOD’s enterprisewide data strategy. As the Defense Department shifts to become the data-centric organization laid out in...
Several purported security flaws in Skype have been disclosed publicly, but Microsoft claims they do not need “immediate security servicing”. On February 2, researcher “mr.d0x,” also...
A security researcher figured out a way to hack older Nespresso coffee machine smart cards in order to obtain virtually unlimited free drinks. The hack, developed...
Cybersecurity is an important business issue that in theory, every executive wants to prioritize. A great deal of the practical challenges come because so many organizations...
How cybersecurity professionals can push back against bad actors taking advantage of increased remote work and pandemic-related changes. The numbers tell the story—and it’s one we...
Netlab, the networking security division of Chinese security firm Qihoo 360, said it had discovered a new fledgling malware operation that is currently infecting Android devices...
Recent Comments