The Latest in IT Security

1

Researchers at CyberArk Labs have created a post-intrusion attack technique known as a Golden SAML that could allow an attacker to fake enterprise user identities and forge authentication to gain access to valuable cloud resources in a federation environment. Read More

Read more ...

1

Mozilla reviews the privacy practices of Internet-connected toys, home accessories, exercise equipment, and more. Read More

Read more ...

1

Ride-hailing service Uber Technologies revealed Tuesday that the company suffered a breach of 57 million Uber user accounts in 2016. According to reports, Uber then attempted to cover up the incident by paying $100,000 to attackers to keep the hack a secret and delete the data. Read More

Read more ...

1

The average home now has around three connected computers and four smart mobile devices. Hardly surprising, considering that 86 percent of us check the Internet several times a day or more, and that’s outside of work. Chatting, shopping, banking, playing games, listening to music, booking travel and managing our increasingly connected homes. The risk of […]

Read more ...

Categories

WEDNESDAY, DECEMBER 13, 2017

Featured

Archives

Latest Comments

Social Networks