| Security Blog News |
| Showing 'Security Blog News' from 1 to 10|
| |ZigDiggity – ZigBee Hacking Toolkit 23rd Aug 2019 [12 hours ago] from DarkNet ZigDiggity a ZigBee Hacking Toolkit is a Python-based IoT (Internet of Things) penetration testing framework targeting the ZigBee smart home protocol.ZigBee continues to grow in popularity as a method for providing simple wireless communication...
| |Capital One Breach: What Security Teams Can Do Now Knowing the methods of the attacker, as laid out in the federal indictment, allow us to prevent similar attacks.
| |Cybersecurity Alert: 34% Of Vulnerabilities Found This Year Remain Unpatched The overall number of reported vulnerabilities in the first half of 2019 has dropped slightly from last year, but risks remain high, according to Risk Based Security.
| |Google Moves Closer To Letting Chrome Web Apps Edit Your Files Despite Warning It Could Be Abused In Terrible Ways Using the new Native File System API, web apps would be able to read and save files, as well as gather info on files stored on your device.
| |Threat Intelligence Gateways: A Useful Adjunct To Overworked Perimeter Security Comparative research shows the relative strengths and weaknesses of five TIG vendors and which kinds of security organization will reap the most benefit.
| |Android Security Bulletin August 2019: What You Need To Know Another month is here, and Android finds itself with a mixture of critical and high vulnerabilities.
| |Android 10: Cheat Sheet Android 10s features will transform some phones into more user-friendly, customizable, and secure environments. Heres what developers, businesses, and users need to know about Googles Android 10.0.
| |5 Identity Challenges Facing Todays IT Teams To take control over your companys security, identify and understand the biggest identity and access management challenges facing IT teams today and start addressing them.
| |Why Hackers Still Impersonate Microsoft More Than Any Other Company Microsoft, PayPal, and Facebook are the top brands hackers attempt to copy in phishing attacks, according to Vade Secure.
| |How CISOs Can Better Defend Their Organizations Against Cyberthreats More chief information security officers are modifying their security strategy from one of prevention to one of detection and response, according to a Forbes Insights report released Wednesday.
| 1 2 3 4 5 6 7 8 9 10 Older » |