The Latest in IT Security

Posts Tagged ‘Featured’

Last year, two researchers set car owners and legislators into a panic when they demonstrated how to cut the engine of a Jeep on the highway from the comfort of an apartment. This year, they are demonstrating a new attack that allows them to slam on someone else’s breaks or spin their steering wheel. Charlie […]

Read more ...

According to the Ponemon Institute’s 2015 “Cost of a Data Breach Study,” a typical organization of 15,000 employees can fall victim to 1,764,121 security incidents per week. Worryingly, only approximately 100 of these breaches are detected. That’s just one part of the problem. Despite being at such high risk, 59 percent of respondents to IBM’s […]

Read more ...

Passwords are a problem, and yet they’re the primary means of authentication used when at work or at home. Recently, Salted Hash examined 126,357 passwords for accounts compromised during Phishing attacks in 2016. What we discovered was both sad and frustrating. The idea for this type of password study came about not too long after […]

Read more ...


Categories

SUNDAY, MARCH 16, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments