Month: December 2019
-
Security Camera Maker Wyze Admits to 23-Day Data Breach
This company attracted attention for its $20 security camera and other super-cheap smart home …
-
Reminder: CISA Publishes Weekly Vulnerability Summaries
Original release date: December 31, 2019Did you know that the Cybersecurity and Infrastructure Security Agency (CISA) publishes a …
-
Microsoft pwns domains used by hackers for large-scale cyber attacks
Pictured below is one such example shared by Microsoft where a very legitimate-looking email has been crafted to trick users. Once a user …
-
Microsoft takes over domains used by hackers for large-scale cyber attacks
Pictured below is one such example shared by Microsoft where a very legitimate-looking email has been crafted to trick users. Once a user …
-
Secure New Internet-Connected Devices
Original release date: December 31, 2019During the holidays, internet-connected devices—also known as Internet of Things (IoT) …
-
Accelerating DevOps with Advanced Container Security
DevOps teams are increasingly required to support containers as software developers leverage containers to accelerate development. However, …
-
SD Times news digest: Facebook fined again for Cambridge Analytica scandal, Google’s privacy commitment and Visual Studio 2019 for Mac
“It’s evident that the data of about 443,000 users of the platform were made available by the developers of the app …
-
Operational Technology: Why Old Networks Need to Learn New Tricks
Cybercriminals innovate when necessary, but like any successful enterprise, they also harvest low-hanging fruit wherever they can find it. …
-
The Fight Against Government Face Surveillance: 2019 Year in Review
Vendors woo law enforcement with a seemingly inexhaustible flow of new spy tech. This places concerned community members, civil society, …
-
Microsoft Removes 50 Domains Tied to North Korean Hackers
Microsoft has taken control of 50 domains that the company claims were used by a hacking group with ties to North Korean to launch …
-
How to Identify, Prioritize and Remediate Your Biggest Security Vulnerabilities
The best time to initiate a comprehensive program for dealing with security vulnerabilities in your organization was yesterday. Systems are …
●●●