Patches for 6 zero-days under active exploit are now available from Microsoft
Tech

Patches for 6 zero-days under active exploit are now available from Microsoft

Wired Hails Rust as 'the Viral Secure Programming Language That's Taking Over Te..
Tech

Wired Hails Rust as 'the Viral Secure Programming Language That's Taking Over Te..

The 'Viral' Secure Programming Language That's Taking Over Tech
Tech

The 'Viral' Secure Programming Language That's Taking Over Tech

2 vulnerabilities with 9.8 severity ratings are under exploit. A 3rd looms
Tech

2 vulnerabilities with 9.8 severity ratings are under exploit. A 3rd looms

Hackers Targeted Apple Devices in Hong Kong for Widespread Attack
Tech

Hackers Targeted Apple Devices in Hong Kong for Widespread Attack

RE:WIRED 2021: Jen Easterly Wants Hackers to Help US Cyber Defense
Tech

RE:WIRED 2021: Jen Easterly Wants Hackers to Help US Cyber Defense

Biden admin’s bug fix mandate aims to prevent the next major cybersecurity attac..
Tech

Biden admin’s bug fix mandate aims to prevent the next major cybersecurity attac..

Researcher Says Apple Ignored Three Zero-Day Security Vulnerabilities Still Pres..
Tech

Researcher Says Apple Ignored Three Zero-Day Security Vulnerabilities Still Pres..

Former US Intelligence Operatives Admit They Hacked for UAE
Tech

Former US Intelligence Operatives Admit They Hacked for UAE

A popular smart home security system can be remotely disarmed, researchers say –..
Tech

A popular smart home security system can be remotely disarmed, researchers say –..

3 Strategies to Secure Your Digital Supply Chain
Business

3 Strategies to Secure Your Digital Supply Chain

Messaging Apps Have an Eavesdropping Problem
Tech

Messaging Apps Have an Eavesdropping Problem

Hospitals Still Use Pneumatic Tubes'and They Can Be Hacked
Tech

Hospitals Still Use Pneumatic Tubes'and They Can Be Hacked

The Top 30 Vulnerabilities Include Plenty of Usual Suspects
Tech

The Top 30 Vulnerabilities Include Plenty of Usual Suspects

True 'shift left and extend right' security requires empowered developers ' Tech..
Tech

True 'shift left and extend right' security requires empowered developers ' Tech..

A Controversial Tool Calls Out Thousands of Hackable Websites
Tech

A Controversial Tool Calls Out Thousands of Hackable Websites

Showing 1 to 16 of 16 articles