News

We’re excited to partner with Datadog to provide our customers with unparalleled visibility into web risks and exposures,” ...
Joining Graham Peck will be Isaac Moddel, VP Sales at Reflectiz, an expert in client-side security. Moddel will offer ...
Every security practitioner knows that employees are the weakest link in an organization, but this is no longer the case.
The OpenSSL Corporation and the OpenSSL Foundation are issuing a final call for speaker proposals for the inaugural OpenSSL ...
The agricultural equipment industry has long considered itself immune from cyber attacks. After all: farm equipment wasn’t Internet-connected and the software and protocols that it used were obscure.
The denial of service attacks, coming in waves, first hit the Web site of Estonia’s prime minister on April 27, 2007, before spreading to a web site run by the country’s President and those of several ...
A presentation at the DEF CON conference in Las Vegas on Sunday highlighted cybersecurity holes that leave keyless electronic door locks vulnerable to getting picked – posing a serious risk to the ...
Consumer advocates and proponents of right to repair laws in 17 states have a new enemy to worry about. The Security Innovation Center, with backing of powerful tech industry groups, is arguing that ...
Vulnerabilities in the STARLINK telematics software used in late model passenger vehicles made by Subaru enabled two, independent security researchers to gain unrestricted access to millions of Subaru ...
The researchers, John Jackson, an application security engineer for Shutter Stock, and the independent researcher known by the handle “ Sick Codes,” said the flaws amount to a “back door” on any TCL ...
The acting head of the U.S. Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports last month in The ...
Neopets, a website that allows children to care for “virtual pets,” has exposed a wide range of sensitive data online including credentials needed to access company databases, employee emails, and ...