Cybersecurity

Microsoft rolls out a new threat intelligence against COVID-19 attacks

COVID-19 has become a hotspot of cyber attacks and spams as the majority of employees are working from home. These…

5 ans ago

New BIAS Vulnerability Affects All Modern Bluetooth Devices

Academic researchers at the École Polytechnique Fédérale de Lausanne (EPFL), a research institute and university in Lausanne Switzerland, discovered a…

5 ans ago

Cyberattack on BlueScope Steel Derails Australia Operations

B lueScope, an Australian steel products manufacturer, reported a cyber incident that affected its manufacturing and sales operations in Australia.…

5 ans ago

PHISHING : A la pêche aux informations !

Le phishing ? C'est quoi ? Le phishing est une technique qui permet à des hackers d'obtenir des informations personnelles sur les…

5 ans ago

The Dramatically Changing Role of the CISO

When I first started covering data security in the 1990s, the relatively new CISO role was almost an entirely technical…

5 ans ago

Supercomputers across Europe have fallen to cryptomining hacks

Cryptomining hacks aren’t new by any stretch, but a string of recent incidents is raising eyebrows. ZDNet reports that culprits…

5 ans ago

Edison Mail iOS bug showed messages intended for other people

Bugs in email clients aren’t unheard of, but they typically affect only those messages sent by or intended for you.…

5 ans ago

Senate measure to block FBI from viewing Americans’ web-browsing history without warrant fails

The Senate rejected an amendment to the Foreign Intelligence Surveillance Act that would have prevented the government from accessing Americans'…

5 ans ago

Survey Finds 41% of Employees Use Personal Apps to Access Sensitive Company Data

Research by work management platform Wrike revealed that 41% of employees working remotely are accessing sensitive and confidential company information…

5 ans ago

Cisco and Palo Alto Networks appliances

Cisco Systems and Palo Alto Networks have fixed similar high-risk authentication bypass vulnerabilities in their network security devices that were…

5 ans ago

This website uses cookies.