News

Every security practitioner knows that employees are the weakest link in an organization, but this is no longer the case.
Joining Graham Peck will be Isaac Moddel, VP Sales at Reflectiz, an expert in client-side security. Moddel will offer ...
The OpenSSL Corporation and the OpenSSL Foundation are issuing a final call for speaker proposals for the inaugural OpenSSL ...
The agricultural equipment industry has long considered itself immune from cyber attacks. After all: farm equipment wasn’t Internet-connected and the software and protocols that it used were obscure.
Consumer advocates and proponents of right to repair laws in 17 states have a new enemy to worry about. The Security Innovation Center, with backing of powerful tech industry groups, is arguing that ...
The acting head of the U.S. Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports last month in The ...
In this Spotlight episode of the Podcast, sponsored* by ForAllSecure we speak with CEO David Brumley about application “fuzzing” and how advancements in machine learning technology are allowing ...
The researchers, John Jackson, an application security engineer for Shutter Stock, and the independent researcher known by the handle “ Sick Codes,” said the flaws amount to a “back door” on any TCL ...
Neopets, a website that allows children to care for “virtual pets,” has exposed a wide range of sensitive data online including credentials needed to access company databases, employee emails, and ...
In-brief: Alphabet’s Nest Cam continues to run even after users have turned it “off,” the company acknowledged on Tuesday, raising questions about transparency and the potential for privacy abuses ...
More than 50 EAS deployments across the United States appear to still contain a vulnerability first discovered and reported by the firm IOActive in 2013, according to a warning posted by the security ...
From analyzing keystroke cadence to mouse use, consumers’ natural behavior and characteristics provide multiple data sources to verify that users are who they say they are–and quickly shut down ...