Traveling can be a lot of fun, but it can also present myriad challenges when it comes to keeping your information and devices secure. A few simple steps and a little advance planning can go a long way to increasing your operational security.
Some versions of BIND 9 contain a severe memory leak that can exhaust the memory resources on a vulnerable server.
A bug that can grant arbitrary code execution has been lurking in the WinRAR compression utility since 2000.
The Brushaloader malware threat, which often loads the Danabot banking trojan, is expanding its target base and refining its tactics.
Enterprise defenders have a very narrow window of opportunity to detect a compromise before attackers spread out through the network and cause more damage. For nation-state attackers, that breakout time is a handful of hours.
Speculative execution enhanced microprocessor performance, but also made them more susceptible to side-channel attacks. The final fix won’t be via software updates.
There are obvious differences between government policy and organizational policy, but when it comes to crafting information security policies, there are several elements that apply to both sides. Here are some of them.
The hack of VFEmail, a hosted email provider, can be a reminder of how disaster recovery planning can be a life saver.
Google has increased the number of apps rejected from the Play Store by 55 percent, thanks to new policies and technology to identify potentially harmful apps.
Parts of the government is still spinning back up after spending 35 days offline as part of the recent partial government shutdown. For security teams with long to-do lists, that's a lot of time they need to regain.
A recent intrusion at Norwegian MSP Visma that researchers attribute to APT10 demonstrates the changing tactics of some advanced attack groups.
A flaw in runC, the underlying container runtime for many platforms, can give an attacker root access to vulnerable hosts.
Two senators have asked the director of the Cybersecurity and Infrastructure Security Agency to look into the national security threat from foreign-based VPNs.
David Scott Lewis was the model for the David Lightman character in WarGames, a true hacker classic.
Apple is eliminating the Do Not Track feature from its Safari browser in version 12.1 and making several other security and privacy changes, as well.