| Security Blog News |
| Showing 'Security Blog News' from 81 to 90|
| |Android Pie à La Mode: Security & Privacy Posted by Vikrant Nanda and René Mayrhofer, Android Security Privacy Team[Cross-posted from the Android Developers Blog]There is no better time to talk about Android dessert releases than the holidays because who doesnt love dessert?...
| |Amazon Sent Private Alexa Voice Interactions From Echo Smart Speaker To The Wrong Customer After one German user requested a copy of their Alexa voice history under the GDPR, he got another users data in the process.
| |2018 In The Rearview Mirror Among this years biggest news stories: epic hardware vulnerabilities, a more lethal form of DDoS attack, Olympic false flags, hijacked home routers, fileless malware - and a new worlds record for data breaches.
| |3 Ways To Protect Your Employees Inboxes From Phishing Threats Some 42% of companies say employees have fallen victim to a phishing attack, according to EdgeWave. Heres how to keep them safe.
| |Automating A DevOps-Friendly Security Policy There can be a clash of missions between security and IT Ops teams, but automation can help.
| |Top 5 Highest-paying Tech Jobs Of 2019 These tech roles will pay the most and be the most heavily recruited this year, according to Scout Exchange.
| |How To Set Up A Windows 10 Computer: 5 Essential Steps Getting a new PC is exciting, but you should follow these setup steps before using a Windows 10 machine.
| |Privacy Futures: Fed-up Consumers Take Their Data Back In 2019, usable security will become the new buzzword and signal a rejection of the argument that there must be a trade-off between convenience and security and privacy.
| |5 Biggest Security Vulnerabilities Of 2018 2018 brought massive, hardware-level security vulnerabilities to the forefront. Heres the five biggest vulnerabilities of the year, and howyou can address them.
| |Attackers Are Using Cloud Services To Mask Attack Origin And Build False Trust Conditioning users to think "padlock equals security" has unintended consequences when cloud services are used to host malware droppers.
| « Newer 4 5 6 7 8 9 10 11 12 13 Older » |