Security
Best Internet Security Software
After more than a year of high-profile cyber attacks and now the threat of cyber war, businesses and even...
HP Wolf Security Report Shows Threat Landscape Getting Scarier
When it comes to securing PCs and Printers, HP is the most advanced of hardware vendors. This advantage is...
Microsoft Gets Rid Of Passwords: I Can Almost Hear Angels Singing
Microsoft announced this week that the company is moving away from passwords. This move may seem sudden, but I...
The Coming AI Threats We Aren’t Prepared For
Artificial intelligence, like any other tool, isn’t inherently good or bad. But AI does automate and emulate other things...
Another Crazy Week in Cybersecurity
Ever since the SolarWinds hack in December, the pace of cybersecurity attacks seems to have picked up, but lately...
Colonial Pipeline Lessons: Ransomware (and Security) Steps Everyone Should Take
From the SolarWinds hack to the Colonial Pipeline ransomware attack, cybersecurity has entered into public consciousness like never before.
How...
Security
Pandemic Fuels Surge in DDoS Attacks
Cybercriminals launched an unprecedented number of distributed denial-of-service (DDoS) attacks in the second half of 2020, fueled by the...
Ransomware Demands, Payments Rising Quickly, Palo Alto Says
In 2017, the WannaCry and NotPetya attacks put cybersecurity professionals and the world at large on notice that ransomware...
Docker 1.12.6 Fixes Privilege Escalation Vulnerability
From the 'Great Container Escape' files:
The Docker Engine 1.12.6 release debuted on Jan. 10 as a security update for...
Y Combinator Alum Castle Takes Aim at Online Fraud
Castle graduated from the Y Combinator cyber accelerator six months ago, bringing its account takeover technology to market. The...