Cyber Security
The agency notes that “user experience” improvements may come with less control over privacy and security. The National Institute of Standards and Technology completed the...
Hi, what are you looking for?
The agency notes that “user experience” improvements may come with less control over privacy and security. The National Institute of Standards and Technology completed the...
Hacker Summer Camp is only days away, so in order to whet your appetite, The Daily Swig has compiled a list of some of the best...
Vulnerabilities in FileWave’s mobile device management (MDM) platform could enable attackers to seize control of vulnerable instances and all their managed devices, security researchers warn. FileWave...
A chained, zero-day exploit could potentially expose all user data in the backend of the companion mobile application for a popular smart weight scale, security researchers...
A new industry group aims to coordinate efforts improve industrial control system security in an effort geared towards bolstering the resilience of critical infrastructure components. The...
Vulnerabilities in SureMDM could have been chained to compromise every device running the popular mobile device management (MDM) platform within a targeted enterprise, security...
Officials in the public and private sectors warned of the need to enact a robust cybersecurity posture at the federal level ahead of growing...
Agencies cannot stop hackers from targeting them. But we can—and should—develop risk management strategies. While serving as the chief information security officer for the...
A zero-click vulnerability in a popular IoT security camera could allow an unauthenticated attacker to gain full access to the device and possibly internal networks, a...
Security flaws in chipsets used by more than 65 IoT device manufacturers have been identified by researchers. The vulnerabilities affect WiFi-enabled devices using a software development...
Recent Comments