To nobody's surprise, hacker groups have started exploiting vulnerabilities that have been made public earlier this month, taking advantage of...
Year: 2019
Online attackers from Russia, Vietnam, and especially China are targeting healthcare data and stealing intellectual property from hospitals, pharmaceutical companies,...
This is something of an unusual situation that we’ve never seen before. It’s not a major catastrophe but it’s certainly...
With a point-in-time risk management approach, compliance leaders attempt to identify potential third-party risks upfront with extensive due diligence before...
Dubbed Key Negotiation of Bluetooth—or KNOB for short—the attack forces two or more devices to choose an encryption key just...
In this article, I am going to share a “warm standby” DR strategy that I helped one of my customers...
Hong Kong’s airport suspended check-ins for a second straight day on Tuesday as protesters again disrupted its operations, hours after...
“The lights in the workshop are very bright, so it gets really hot,” she said. Fang added that her complaints...
The cybercriminal’s most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared...
William Strampel goes back before a judge Wednesday, nearly two months after the College of Osteopathic Medicine's ex-dean was convicted...