The Future is Female: A Key to the Cybersecurity Workforce Challenge
With cybersecurity worldwide facing a major applicant shortage, businesses should be courting women and supporting girls. Go to Source
With cybersecurity worldwide facing a major applicant shortage, businesses should be courting women and supporting girls. Go to Source
The issue, present on Android versions, is similar to the known man-in-the-disk attack vector. Go to Source
Someone AirDropped a picture of a suicide vest to multiple people on a JetBlue flight, prompting an evacuation. Go to Source
The FTC has levied its biggest fine ever against the social network, but it’s unlikely to have much effect. Go to Source
A dropper called “Topinambour” is the first-stage implant, which in turn fetches a spy trojan built in several coding languages. Go to Source
An independent researcher earned a $30,000 bug bounty after discovering a weakness in the mobile recovery process. Go to Source
In this first part of a two part series, Shawn Taylor with Forescout talks to Threatpost about lessons learned from helping Atlanta remediate and recover from its massive ransomware attack. Go to Source
Most respondents in a recent survey say they’re losing the battle despite having up-to-date protections in place. Go to Source
Vulnerability experts Michiel Prins and Greg Ose discuss the 15 most common vulnerability types. Go to Source
Rupert Murdoch’s News Group has agreed to pay damages to Paul McCartney’s ex as part of the massive phone-hacking scandal by UK tabloids. Go to Source