Security

Supply-chain hack attacks are worrying investigators

What do you know about supply-chain attacks? In January, an article in CSO said it's when a weak link in your enterprise security might lie with partners and suppliers. It's when someone infiltrates your system through ...

Security

Two security researchers find WPA3 vulnerabilities

You mean my safety blanket isn't safe? A next-gen standard "was supposed to make password cracking a thing of the past," clucked Ars Technica, after learning that vulnerabilities were found in the WPA3 protocol that could ...

Consumer & Gadgets

Google enables use of Android phones as a physical security key

Google has announced that it has made software updates to Chrome and Android that make it possible to use an Android phone (7+) as a physical security key. In their announcement, Google once again claimed that using physical ...

Security

Kaseya gets master decryption key after July 4 global attack

The Florida company whose software was exploited in the devastating Fourth of July weekend ransomware attack, Kaseya, has received a universal key that will decrypt all of the more than 1,000 businesses and public organizations ...

Internet

Fastly blames global internet outage on software bug

Fastly, the company hit by a major outage that caused many of the world's top websites to go offline briefly this week, blamed the problem on a software bug that was triggered when a customer changed a setting.

Security

Hackers targeted SolarWinds earlier than previously known

The hackers who carried out the massive SolarWinds intrusion were in the software company's system as early as January 2019, months earlier than previously known, the company's top official said Wednesday.

page 1 from 4