April 2020 Patch Tuesday: Microsoft fixes 4 actively exploited zero-day bugs

April 2020 Patch Tuesday: Microsoft fixes 4 actively exploited zero-day bugs

Yesterday, for the April 2020 Patch Tuesday, Microsoft revealed fixes for 113 vulnerabilities, including 4 security updates for vulnerabilities that are actively exploited. The patches apply to the following Microsoft software: • ...
https://s28241.pcdn.co/wp-content/uploads/2018/02/IoT-Security-blog-banner.jpg

Best Practices For IoT Security

The explosion of Internet of Things devices (IoT) onto the technology market has revolutionized how businesses operate. The endless possible applications of these incredibly diverse devices has led to a surge in ...
Equifax Breach: What Happened

Equifax’s Story: The Risks of Lax Security

The post Equifax’s Story: The Risks of Lax Security appeared first on SecureW2 ...
Government Shutdown's Negative Impact on Federal Cybersecurity

Government Shutdown’s Negative Impact on Federal Cybersecurity

A quick glance at the headlines tell you how the government shutdown is affecting people across the country. National parks vandalized. Food safety inspections halted. Air travel at risk as planes aren’t ...
Security Boulevard
Facebook

The Shared Security Weekly Blaze – The Insecure Internet of Things, Spectre Patch Updates, Android Malware

This is the Shared Security Weekly Blaze for March 19, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions. This episode was hosted by Tom ...
Top 3 ways to prevent Spectre and Meltdown

Top 3 ways to prevent Spectre and Meltdown

Data security is critical to the healthcare industry. Hospitals and clinics need to ensure medical records are protected at all times to stay HIPAA-compliant. But with Spectre and Meltdown affecting every server, ...
ethical hackers

Deloitte Confirms Email Server Compromise

Hackers broke into the email service of professional services giant Deloitte and reportedly accessed confidential messages, usernames, passwords, IP addresses, business diagrams and other information belonging to its clients. The security breach ...