| Security Blog News |
| Showing 'Security Blog News' from 21 to 30|
| |Top 10 App Vulnerabilities: Unpatched Plugins And Extensions Dominate Despite the existence of patches, the proliferation of unpatched installations are enticing targets for malicious actors, according to a WhiteHat report.
| |Smart Building Security Flaws Leave Schools, Hospitals At Risk Vendors of smart building hardware issued updates to products without disclosing that vulnerabilities were patched, leading security systems for schools and hospitals to be accessible via the web.
| |Online Fraud: Now A Major Application Layer Security Problem The explosion of consumer-facing online services and applications is making it easier and cheaper for cybercriminals to host malicious content and launch attacks.
| |Police Cant Force You To Unlock Your Phone By Iris, Face Or Finger Police cant force you to unlock your phone by iris, face or finger
| |Why Cyberattacks Are The No. 1 Risk The paradigm shift toward always-on IT requires business leaders to rethink their defense strategy.
| |Why Vendor Security Practices Are Causing Heartburn For Enterprise Pros High dependencies on external vendors with unclear security policies is a concern among IT professionals, according to a Deloitte report.
| |Cyberattacks Now Cost Businesses An Average Of $1.1M Malware and bots, phishing, and DDoS attacks are some of the top threats companies face, according to Radware.
| |Advanced Phishing Scenarios You Will Most Likely Encounter This Year In 2019, there will be no end in sight to email-driven cybercrime such as business email compromise, spearphishing, and ransomware.
| |PHA Family Highlights: Zen And Its Cousins Posted Lukasz Siewierski, Android Security Privacy Team Google Play Protect detects Potentially Harmful Applications (PHAs) which Google Play Protect defines as any mobile app that poses a potential security risk to users or to user data—commonly...
| |Good Data In, Good Data Out: How Innovation In Technology Has Evolved Xeroxs CISO Alissa Abdullah discusses how innovation in technology and security has changed throughout her career.
| « Newer 1 2 3 4 5 6 7 8 9 10 Older » |