Technology never stands still, so building new solutions based on requirements drafted in the past will always result in out of data solutions. Imagine traveling in...
Threat levels have ratcheted up a notch about miscreants who posted an exploit that targets a security vulnerability in SAP’s enterprise software. The functional exploit goes...
VPN providers should adhere to a minimum standard of ethics to deter cybercriminals from taking advantage of their privacy-enhancing software. That is the stance taken by industry group...
Carders, fraudsters, and other cybercriminals will be quick to migrate to other nefarious platforms if infamous darknet site the Joker’s Stash closes as promised next month,...
The vast majority of the most popular Windows-native PDF viewers were vulnerable to multiple attack techniques exploiting standard PDF features, a team of security researchers has discovered. Several...
Here are the news and updates you may have missed. The Trump administration cited security breaches sweeping U.S. government agencies and tech companies in imposing some...
The executive order encourages federal agencies to divest from unmanned aerial systems manufactured by China, Russia and Iran. In the final days prior to his departure...
Here’s what you need to know to protect federal employees and secure classified data. As the U.S. prepares for President-elect Biden’s administration, there will be a...
Gen. Lloyd Austin committed to conducting a review of defense cyber operations, if confirmed. President-elect Joseph Biden’s nominee for defense secretary told senators in a Tuesday...
Sen. Josh Hawley blocked quick confirmation of Alejandro Mayorkas. President-elect Joe Biden’s nominee to lead the Department of Homeland Security Alejandro Mayorkas promised to review the...
Recent Comments