The day's top cybersecurity news and in-depth coverage
June 17, 2020
The memory corruption flaws exist in a wide range of commercial and consumer devices, and can allow full takeover of them. Read more â¶
Regular reviewing of these Windows event logs alone or in combination might be your best chance to identify malicious activity early.
Home routers, printers, security systems, DVRs, gaming consoles and other smart devices can significantly change the threat model for the corporate network.
Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.
The recent ANPR data leak raised questions regarding privacy versus data security with public surveillance systems. How do private and public organizations maintain transparency while protecting personal data?
Taking governance shortcuts in order to quickly take advantage of competitive opportunity can lead to major failings when it comes to security and privacy and cause serious long-term damage to the business.