This past spring, as the COVID-19 pandemic took hold, online learning became the new norm as universities and classrooms around the world were forced to close their doors. By April 29, 2020, more than 1.2 billion children across 186 countries were impacted by school closures. Shortly after schools began to transition to emergency remote learning,…
Cybercriminals can use social media in many ways in order to trick employees.
Cybersecurity researchers Brian Gorenc and Dustin Childs talk about the biggest vulnerability disclosure challenges in IoT and the industrial vertical.
If the social-media behemoth finds a bug in another platform’s code, the project has 90 days to remediate before Facebook goes public.
A phishing campaign uses overlay screens and email ‘quarantine’ policies to steal targets’ Microsoft Outlook credentials.
The company also committed to more transparency about app flaws, with an advisory page aimed at keeping the community better informed of security vulnerabilities.
An attacker can execute remote code with no user interaction, thanks to CVE-2020-3495.
The top award for flaws that allow cybercriminals to abuse legitimate services has increased by 166 percent.
The Evilnum APT has added the RAT to its arsenal as part of a big change-up in its TTPs.
The NSA argued its mass surveillance program stopped terrorist attacks – but a new U.S. court ruling found that this is not, and may have even been unconstitutional.