To nobody's surprise, hacker groups have started exploiting vulnerabilities that have been made public earlier this month, taking advantage of...
Information Security
Online attackers from Russia, Vietnam, and especially China are targeting healthcare data and stealing intellectual property from hospitals, pharmaceutical companies,...
Dubbed Key Negotiation of Bluetooth—or KNOB for short—the attack forces two or more devices to choose an encryption key just...
The cybercriminal’s most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared...
Cyberattacks designed to cause damage have doubled in the past six months and 50 percent of organizations affected are in...
The technical details of the breach make it more complicated still. What Thompson did was only possible because Capital One...
As we reported in recent weeks, Florida has proven an especially lucrative target for these cybercriminals who hit a trio...
Hackers have breached the systems of 62 colleges and universities by exploiting a vulnerability in an enterprise resource planning (ERP)...
I find that unless you’re implementing a security plan in a very specific way, the terminology really doesn’t matter. Implementing...
A few years ago, hackers discovered that they could remotely take control of a PC by exploiting a vulnerability in...