CryptoPhone users found 17 fake “cell towers” in a month, but don’t know who deployed them or why. If you think you'd know if your calls are being intercepted by seeing the phone connect to "2G," then ...
Give yourself some added peace of mind by giving your Google account a thorough set of security reinforcements.
A hacker noticed the change in its status and hijacked the dead add-in and its 4.71-star rating to conduct a phishing campaign that the company which uncovered the attack, plug-in security company Koi ...
Microsoft has a fix for preventing the next CrowdStrike fiasco, but is it a good one? Maybe giving security firms access to the Windows isn’t the best idea, but freezing them out could be worse.
Fido Alliance proposes a new standard that makes it possible to use the same passkeys even if you change platform or service. Zero trust isn’t dead, but it’s often misapplied. BeyondTrust Chief ...
Employees are using AI tools every day — often without IT oversight — and it’s quietly putting sensitive business data at risk. In this episode of Today in Tech, host Keith Shaw sits down with ...
IT organizations deploy a number of strategies and frameworks to assess their organization’s risk and security posture – everything from ISO to COBIT. But while these frameworks are often helpful ...
The monitoring and security specialist has appointed the ex-Proofpoint CEO in the wake of the surprise departure of Doug Merritt last year. Fujitsu, in close partnership with ServiceNow, can help ...
We meet Ian Mountford, a governance, risk and compliance consultant who transitioned into cyber security late in his career after being the victim of a hack. Ian talks about his rich and varied career ...
The popular messaging app WhatsApp got a range of new security features Tuesday with the launch of “Strict Account Settings.” The security changes, which must be turned on, allow the app to block ...
From spotting weapons and detecting smoke to predicting where incidents are most likely to occur, artificial intelligence is reshaping the future of physical security. In this episode of Today in Tech ...