The Latest in IT Security

Posts Tagged ‘Risk’

The manufacturer of a popular projector found primarily in classrooms is neglecting to address several authentication bugs that exist in the device that could open it up to hacks. It’s technically the firmware for the projector, InFocus IN3128HD, version 0.26, that’s vulnerable. The web interface requires an admin password to view or modify the device’s […]

Read more ...

#google has developed a new extension for its Chrome browser that aims to stop people from falling prey to #phishing sites. The free Password Alert extension stores an encrypted version of a person’s password and warns if it is typed into a site that isn’t a Google sign-in page, according to a blog post on […]

Read more ...

Government cyber security professionals estimate that cyber threats exist on their networks for an average of 16 days before they are detected – hiding in plain sight. The good news is that 86 percent say big data analytics will improve cyber security efforts. But, just 28 percent are fully leveraging big data for security purposes […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments