Loading...
August 08, 2019
According to documents seen by CSO, an unknown attacker took control of the official email account of the Saudi embassy in The Netherlands and demanded a ransom of $50 million for ISIS. Read more â¶
11 new state privacy and security laws explained: Is your business ready?
New Spectre-like CPU vulnerability bypasses existing defenses
Review: How Nyotron Paranoid puts endpoint security worries to rest
Know your Edge Chromium security options
What is a computer worm? How this self-spreading malware wreaks havoc
Famous social engineering attacks: 12 crafty cons
Digital Innovation (DI) can provide meaningful impacts for businesses of all types â companies looking for a competitive edge need to embrace DI. Read more â¶
States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. Let's break down what each of these laws entails and how businesses and consumers are affected. Read more â¶
DEALPOST
This intuitive collaboration platform is made for teams that move. Read more â¶
The SWAPGS vulnerability can allow attackers to access contents of kernel memory addresses. Microsoft and Intel have coordinated on a mitigation. Read more â¶
Adding an extra layer of endpoint protection isn't just for the overly cautious. Read more â¶
Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know. Read more â¶
A worm is a form of malware (malicious software) that operates as a self-contained application and can transfer and copy itself from computer to computer. Read more â¶
This rogues gallery of social engineering attack examples made headlines by taking advantage of human nature. Read more â¶
Cost savings and business benefits enabled by Adobe Sign. Read more â¶
© 2024