Legislation introduced in both the House and Senate would ban the use of facial recognition systems by federal entities.
The Lawful Access to Encrypted Data Act introduced this week would require device makers and service providers to create exceptional access to encrypted data at rest and in motion.
The Evil Corp group responsible for the Dridex malware is using a new ransomware called WastedLocker that targets cloud services and backups.
Melanie Ensign, CEO and founder of Discernible Communications, joins Dennis Fisher to talk about what effective security and privacy communications look like.
The Holmium threat group has been using password spraying attacks against Office 365 to gain access to corporate networks.
Hundreds of millions of embedded and enterprise devices are vulnerable to a long list of flaws in the Treck TCP/IP stack.
Attackers launched a massive distributed denial-of-service against a specific website hosted by a hosting provider in early June. Not only was the 1.44 terabit-per-second DDoS attack the largest Akamai has seen to date, it was also one of the most complex to resolve.
Malware and phishing campaigns preying on interest in the COVID-19 crisis have spiked but are now falling off in many places.
Intel's new Control-Flow Enforcement Technology will be built into its forthcoming Tiger Lake processors and integrated with Windows 10.
As the original root certificates begin to expire, more and more networked devices, including smart devices and internet of things, will stop working. They won't be able to connect online to services unless they are updated, and that is easier said than done.
The FBI is warning of a potential spike in mobile banking app attacks resulting from a drop in the number of people visiting physical bank branches.
Microsoft fixed a critical remote code execution flaw in the SMBv1 protocol in many of the current Windows versions.
Billions of network-connected devices, such as printers, routers, smart TVs, and video game consoles, are open to attack via the CallStranger vulnerability in the Universal Plug and Play (UPnP) protocol.
Protecting data while in use is a challenge. IBM released an open source toolkit to help developers implement fully homomorphic encryption in their applciations.
People enrolled in Google's Advanced Protection Program can now use hardware keys that support WebAuthn with their iOS devices.