Researchers from Microsoft recently discovered many Android applications — including at least four with more than 500 million ...
Organizations can go a long way toward preventing spoofing attacks by changing one basic parameter in their DNS settings.
While legal legwork is already in progress to hold software vendors liable for delivering insecure products, actual laws and ...
DMARC adoption is more important than ever following Google's and Yahoo's latest mandates for large email senders. This Tech ...
Threat actor dropped in to Dropbox Sign production environment and accessed emails, passwords, and other PII, along with APIs ...
Two years after a warrant went out for his arrest, Aleksanteri Kivimäki finally has been found guilty of thousands of counts ...
Weaponizing Microsoft's own services for command-and-control is simple and costless, and helps attackers better avoid ...
If a recent wily cyber-espionage campaign against Middle Eastern government entities is any indication, cyber defenders will ...
The quest to keep data private while still being able to search may soon be within reach, with different companies charting ...
Unmanaged and unknown Web services endpoints are just some of the challenges organizations must address to improve API ...
Some customers found that they had the ability to cancel a stranger's flight to another country after opening the app, which ...
UnitedHealth's Change Healthcare subsidiary paid $22 million in ransom to the attackers who broke into its systems in ...