How Zoom moved toward end-to-end encryption
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
21 articles
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
Kaspersky Password Manager can do a lot more than just store your passwords.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
Home and SOHO routers are often insecure, but companies can protect themselves from attacks through remote workers’ home routers.
At RSA Conference 2021, representatives of international financial institutions spoke about the fight against money mules and launderers.
Researchers at RSA Conference 2021 demonstrated how Tesla and Mobileye autopilots can be tricked by “phantom” images.
Researchers discuss the new cybercriminal tactic of downloading outdated binaries onto modern computers and exploiting their vulnerabilities.
At RSA Conference 2021, researchers talked about how they managed to turn a Comcast Xfinity remote into a listening device.
At the 2021 RSA Conference, a panel of experts discusses the need for better collaboration in thwarting cybercrime.
At RSA Conference 2020, Ben Smith addressed the need to consider generational differences in the workplace when creating a security strategy.
With deepfakes becoming more and more common — and more and more convincing — how can you protect your business?
At RSA Conference 2020, the former director of Cyber Intelligence and Investigations for the NYPD talked about how the police have raised cybersecurity awareness.
Quantum computers are set to change our approaches to data encryption. When that will happen is not yet clear, but we do know when companies need to start preparing — right now.
At the RSA Conference 2020 in San Francisco, a panel of experts discuss the issues with securing elections.
A story from RSAC 2019 on how domain fronting is used to disguise communications between an infected machine and a command server.
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.
Researchers at RSAC 2019 reported on the current vulnerability landscape and built a model that helps with effective patching strategy.
Despite the plunge in cryptocurrency values, not only has cryptojacking not declined, it is growing rapidly.
In the movie Dude, Where’s My Car? (2000), viewers follow the humorous tale of two guys who partied a bit too hard trying to remember where they parked their car. We’ve all
SAN FRANCISCO — It’s an utterly played out platitude that the security industry is largely failing at its mission to protect computers and networks and all the nearly infinite data