
1235 articles
With deepfakes becoming more and more common — and more and more convincing — how can you protect your business?
Microsoft has released a patch for newly discovered critical vulnerability CVE-2020-0796 in the network protocol SMB 3.1.1.
Our security solution for Internet gateways is updated and more capable than ever.
At RSA Conference 2020, the former director of Cyber Intelligence and Investigations for the NYPD talked about how the police have raised cybersecurity awareness.
Quantum computers are set to change our approaches to data encryption. When that will happen is not yet clear, but we do know when companies need to start preparing — right now.
At the RSA Conference 2020 in San Francisco, a panel of experts discuss the issues with securing elections.
Researcher Fabian Ising, speaking at the Chaos Communication Congress, showed the limits of PDF encryption’s strength.
What exactly was certified and how the certification was performed
Researchers presented a study on the reliability of modern vehicle immobilization systems at the Chaos Communication Congress.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
End of support for Windows 7 is cause to analyze your information infrastructure carefully and identify weak spots.
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
Four steps to reduce your company’s IT carbon footprint — and save money.
Researchers try to modify the contents of a signed PDF file without invalidating the signature.
When training staff, it is not enough to give them the right information; they also have to digest it and remember it.
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
Longer product life cycles mean sustainability; shorter ones are easier in terms of support. Which should you choose?
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.