How to secure DevOps
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
3983 articles
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Dave and Jeff discuss the underground trade of pirated OnlyFans porn, World of Warcraft bots, an alleged arsonist’s public posts getting her nabbed by the FBI, and more.
Zoom developers have made their service more secure. We review what’s changed.
Our experts uncovered a scheme to extract cardholder data using Google tools.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
To protect ADAS from external interference, cars need a special approach to cybersecurity.
This week, Dave and Jeff discuss a crazy story of cyberstalking from eBay, NHS tracing app issues, cryptoexchange money laundering, and more.
Digitalization opens up great opportunities, but at the same time it means that exposure to cyberthreats is increasing. What should we do about that?
A particular type of malware seeks user credentials, including accounts for gaming services such as Origin, Battle.net, and Uplay.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
We explain how to keep your computer running fast without sacrificing protection.
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
Dave and Jeff discuss a ransomware attack on Honda, the support life of IoT appliances, Singapore COVID-19 tracking, Space Force, and more.
The abundance of work-related cloud tools and services calls for smart password handling.
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
Alongside their benefits, cloud solutions for file storage and document or project management can cause many problems.
Dave and Jeff discuss how to keep personal data safe while protesting, the kerfuffle around NHS coronavirus texts, and more.
How to find an individual approach for each employee without committing to a personal mentor for everyone.
It’s hard not to worry when you don’t know where your child is. We explain how to pinpoint their location and save your nerves.