Security feed

Earlier
The Department of Homeland Security and two U.S. military branches already had discontinued use of the app based on concerns over Chinese data-security and censorship practices. [...]
Tue, Feb 25, 2020
Source: Threat Post
Cybersecurity teams continue to struggle with hiring and retention, and very little improvement has been achieved in these areas since last year, according to new global research from ISACA that identifies current workforce challenges and trends in the cybersecurity field. [...]
Tue, Feb 25, 2020
Source: Security magazin
Michael S. Oberlaender, a CISO and CSO, author and subject matter expert who has worked in global executive level security roles and in IT both in the U.S. and EU for more than 25 years, has released a new book on CISO leadership. [...]
Tue, Feb 25, 2020
Source: Security magazin
Software developer builds a malicious proof-of-concept iOS app that can read data temporarily saved to the device's clipboard. [...]
Mon, Feb 24, 2020
Source: Threat Post
Hackers Could Shut Down Satellites—or Turn Them into Weapons l33tdawg Mon, 02/24/2020 - 14:19 [...]
Mon, Feb 24, 2020
Source: hitb
EU plans to link member states' facial recognition databases l33tdawg Mon, 02/24/2020 - 14:19 [...]
Mon, Feb 24, 2020
Source: hitb
LTE security flaw can be abused to take out subscriptions at your expense l33tdawg Mon, 02/24/2020 - 14:19 [...]
Mon, Feb 24, 2020
Source: hitb
Leak shows EU police aim to create an international facial recognition database l33tdawg Mon, 02/24/2020 - 14:19 [...]
Mon, Feb 24, 2020
Source: hitb
These were the most common forms of cyberattack last year l33tdawg Mon, 02/24/2020 - 14:19 [...]
Mon, Feb 24, 2020
Source: hitb
This Technique Uses AI to Fool Other AIs l33tdawg Mon, 02/24/2020 - 14:19 [...]
Mon, Feb 24, 2020
Source: hitb


Print pagePDF pageEmail page