Thanks to Black Hat for publishing the Black Hat 2019 tremendous conference videos on their YouTube Channel Permalink
From 2015 through 2016, during the run-up to the presidential election, certain cloud servers used by the Democratic National Committee…
The Federal Trade Commission (FTC) dropped the $30 million hammer on Career Education Corporation (CEC) for using leads obtained from…
Organizations, particularly those that recognize that they don’t have essential security and data recovery measures in place, have taken out…
Russia’s infrastructure for spying on its citizens has been revealed this week. An errant Nokia employee put terabytes of secret data…
As networks become less secure and the data stored on the cloud becomes more valuable, cybersecurity breaches are becoming both…
An in-depth look at the types of attacks that are involved in 32% of all data breaches In our news-heavy…
In cybersecurity, the bad guys almost always have a head start on the good guys. There are several reasons for…
Sen. Ron Wyden (D-Ore.) blurts out his most outspoken criticism yet of Mark Zuckerberg. The Facebook CEO stands accused of lying…
Cybersecurity researchers have identified a critical flaw in the Android smartphones built by Samsung, Huawei, LG, and Sony, whereby a…