How Zoom moved toward end-to-end encryption
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
24 articles
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
Kaspersky Password Manager can do a lot more than just store your passwords.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
Home and SOHO routers are often insecure, but companies can protect themselves from attacks through remote workers’ home routers.
At RSA Conference 2021, representatives of international financial institutions spoke about the fight against money mules and launderers.
Researchers at RSA Conference 2021 demonstrated how Tesla and Mobileye autopilots can be tricked by “phantom” images.
Researchers discuss the new cybercriminal tactic of downloading outdated binaries onto modern computers and exploiting their vulnerabilities.
At RSA Conference 2021, researchers talked about how they managed to turn a Comcast Xfinity remote into a listening device.
At the 2021 RSA Conference, a panel of experts discusses the need for better collaboration in thwarting cybercrime.
At RSA Conference 2020, Ben Smith addressed the need to consider generational differences in the workplace when creating a security strategy.
With deepfakes becoming more and more common — and more and more convincing — how can you protect your business?
Quantum computers are set to change our approaches to data encryption. When that will happen is not yet clear, but we do know when companies need to start preparing — right now.
At the RSA Conference 2020 in San Francisco, a panel of experts discuss the issues with securing elections.
A story from RSAC 2019 on how domain fronting is used to disguise communications between an infected machine and a command server.
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.
Researchers at RSAC 2019 reported on the current vulnerability landscape and built a model that helps with effective patching strategy.
Despite the plunge in cryptocurrency values, not only has cryptojacking not declined, it is growing rapidly.
In the movie Dude, Where’s My Car? (2000), viewers follow the humorous tale of two guys who partied a bit too hard trying to remember where they parked their car. We’ve all
When a product is built, the manufacturer typically has a lifecycle in mind in regards to how long a consumer will ideally use the device. For example smartphones are something
During the 2016 RSA Conference in San Francisco, Kurt Baumgartner, Principal Security Researcher, Global Research & Analysis Team, discussed the need for the transportation industry to put some focus onto