- Welcome Guest
- Sign In
The end of the year is quickly approaching, which means it’s time to do the analyst thing and look ahead to the changes, trends, and anticipated disruptive products we are likely to see next year.
Quick Response codes have become a vehicle for bad actors to steal credentials, infect mobile devices, and invade corporate systems.
TV set-top boxes infected with malware are being sold online at Amazon and other resellers, and the EFF wants the Federal Trade Commission to put a stop to it.
TuxCare technical evangelist Joao Correia highlights the perils of delayed system patching in Linux environments, offering vital advice to prevent ransomware attacks and data breaches.
Despite the growing disdain for the cumbersome process of creating and entering passwords, the transition toward a future without them is gaining traction at a surprisingly slow pace.
Cyber insurance premiums are soaring as insurers limit what's covered, exposing a gap in cybersecurity financial safety nets, according to a new report.
Let's talk about security this week in the context of HP's Quarterly Security Report, and what HP is doing to step up to the problem. Then we'll close with what may be my new favorite phone: the Motorola 2023 Razr foldable phone.
Researchers reveal a novel security risk as hackers exploit generative AI's 'hallucinations' to deliver malicious code into a company's development environment, posing a growing threat to enterprise security.
The U.S. Department of Justice has another feather in its cyberwarfare cap after taking down the cybercrime network of Turla, a criminal gang linked to Russia called one of the world's most sophisticated cyber-espionage groups.
Like a persistent piece of malware that your antivirus product just can't seem to eradicate, the annual RSA cybersecurity conference was back with a vengeance this year. But while the malware example is inherently malicious, the industry event seemed to be bustling with goodwill and a positive messa...
New cyber research connects the infamous North Korea-aligned Lazarus Group behind the Linux malware attack called Operation DreamJob to the 3CX supply-chain attack.
The FBI's Denver office is cautioning consumers about using free public charging stations, saying bad actors can use the USB ports at the juice stops to introduce malware and monitoring software onto devices.
Online raiders are stealing IP addresses and converting them to cash by selling them to so-called proxyware services.
Apply these tips to prevent bad actors from using your IP address to load malware onto your devices, serve you with ransomware, hack into your financial accounts, or steal your entire online identity.