Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Open source is everywhere, according to the 2022 OSSRA report. Identifying, tracking, and managing open source is critical for effective software security. → Read More
For the first time in four years, the OWASP Top 10 list of web application risks was updated for OWASP's 20th anniversary. → Read More
There is no way to cope with modern software development's level of velocity without automating security testing tools. → Read More
Security startup Prevasio posted a report analyzing public Docker container images hosted on Docker Hub. It found that 51% had critical vulnerabilities. → Read More
Officials in two Florida cities who paid off ransomware attackers spent a lot less than other cities, like Atlanta and Baltimore, that refused to pay and are spending millions. But the short-term gain may lead to long-term pain, since it will likely produce a spike in similar attacks. → Read More
Researchers are working feverishly to make the autonomous vehicles of the future secure from cyberattacks. That is obviously a good thing, but the connected cars of today need that kind of security just as much. → Read More
As an industry, retail’s reputation for providing software security has taken some hits. The top 15 data breaches of the current century include Target in 2013, with account information on an estimated 110 million customers compromised; TJX in 2006, with 94 million credit cards exposed; and Home Depot in September 2014, with about 56 million customer credit/debit cards compromised. → Read More
As an industry, retail’s reputation for providing software security has taken some hits. The top 15 data breaches of the current century include Target in 2013, with account information on an estimated 110 million customers compromised; TJX in 2006, with 94 million credit cards exposed; and Home Depot in September 2014, with about 56 million customer credit/debit cards compromised. → Read More
U.S. electronic voting systems are demonstrably insecure, even though physical access to them is necessary for most exploits. Still, little has been done to improve things since the 2016 election. So why should voters trust the results? → Read More
No, vast swaths of the U.S. are not about to go dark and cold because of a "9/11"-style cyberattack. But the nation's critical infrastructure remains much more vulnerable than it should be, and needs to improve its security - a lot. → Read More
Job prospects in cybersecurity are better than bright - unemployment is in the negative range, with at least a half-million jobs vacant in the U.S. alone. The challenge is not just to fill those jobs, but to fill them with qualified people who reflect the diversity of the workforce. → Read More
It's been a year since Equifax acknowledged a catastrophic data breach that compromised the personal information of more than 147 million people. It prompted congressional hearings and investigations. But it hasn't been a game changer, legislatively or in software security. → Read More
If you’re a member of the US “intelligence community” Thursday was a great day for homeland security. Less so if you're a privacy advocate. → Read More
The technical description of the “Fruitfly” malware is spyware - but perhaps the term creepware would be more appropriate. → Read More
FBI director Christopher Wray is still fighting for encryption back door → Read More
The chances that US border agents will be pulling data from your devices declined this past week - at least by a little. → Read More
If you’re among the 140 million users who enjoy streaming music from Spotify, you might want to make sure you have a strong password. → Read More
Turns out that those sensors in your smartphone that do all kinds of cool, magical things have a not-so-cool downside. → Read More
Everything and everybody is hackable - and that includes Big Brother → Read More
Trading was suspended after four minutes “to ensure a fair and orderly market.” But things were anything but orderly at that point. → Read More