Security News > 2018 > May

This simple setup will help you discover if you've got leaky apps.

Game of Thrones is a gripping, global phenomenon. One of the main reasons for its popularity is its nuanced portrayal of characters who are not 100% good or evil. Over seven seasons, the HBO show...

Who is archiving the web, and what happens when people ask for information to be ‘un-archived’? We may have just found out.

Cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims, potentially siphoning sensitive data, launching ransomware...

An independent global survey of 800 CIOs revealed that 73% of organizations say the need for speed in digital innovation is putting customer experience at risk. The study found that on average,...

What happens if organizations that must comply with GDPR have yet to achieve compliance, despite having had two years to do so before enforcement begins? Don't panic, says cybersecurity expert...

Mozilla is rolling out support for two-factor (or two-step) authentication for anyone who has a Firefox account.

Use of Analytics Apparently Helped to Prevent Fraud, Warn VictimsAn unusual breach notification issued by health insurer Humana shows how some organizations are identifying anomalous behaviors of...

There is a growing war among nations and the potential victims may not even know they are targeted as pawns in a larger geopolitical game. This war is not being fought openly with the same...

A group of German researchers has devised a new attack method capable of bypassing AMD’s Secure Encrypted Virtualization (SEV). read more