Security

Supply-chain hack attacks are worrying investigators

What do you know about supply-chain attacks? In January, an article in CSO said it's when a weak link in your enterprise security might lie with partners and suppliers. It's when someone infiltrates your system through ...

Security

Two security researchers find WPA3 vulnerabilities

You mean my safety blanket isn't safe? A next-gen standard "was supposed to make password cracking a thing of the past," clucked Ars Technica, after learning that vulnerabilities were found in the WPA3 protocol that could ...

Consumer & Gadgets

Google enables use of Android phones as a physical security key

Google has announced that it has made software updates to Chrome and Android that make it possible to use an Android phone (7+) as a physical security key. In their announcement, Google once again claimed that using physical ...

Security

Kaseya gets master decryption key after July 4 global attack

The Florida company whose software was exploited in the devastating Fourth of July weekend ransomware attack, Kaseya, has received a universal key that will decrypt all of the more than 1,000 businesses and public organizations ...

page 1 from 5