The Latest in IT Security

1

Traditional perimeter defenses are having a hard enough time keeping up with the dynamic nature of cloud and mobile connections with corporate assets.

Read more ...

1

A “cybersecurity enthusiast” that goes by VectorSEC on Twitter has published AutoSploit, a Python-based tool that takes advantage of Shodan and Metasploit modules to automate the mass exploitation of remote hosts. Read More

Read more ...

1

Oh good, there’s a plethora of vulnerabilities, including a hardcoded backdoor, in 12 Western Digital My Cloud network storage devices.

Read more ...

1

Apple just can’t seem to get away from the theme of security flaws right now. Last month it was the macOS 10.13 root password issue, hot on the heels of the news that the iPhone’s X’s much-vaunted Face ID authentication could be bypassed using a prosthetic mask. Read More

Read more ...

Categories

FRIDAY, APRIL 27, 2018

Featured

Archives

Latest Comments

Social Networks