Illinois Supreme Court rules in favor of class action against company’s practice of scanning people’s fingers when they enter amusement parks.Read more
One in five apps designed for children contravened the Children’s Online Privacy Protection Act (COPPA)Read more
Another silver lining for firms that choose to pay their extortersRead more
Hello everyone, I was an idiot and trusted someone I met on Omglee. Long story short, they pretended to beRead more
“Here’s how it works!” Dan Aykroyd energetically tells the SNL audience. “Catch a bass, remove the hook, and drop the bass – that’s the WHOLE bass – in the Bass-O-Matic 76!” As he says this in his best punchy announcer voice, he picks up a real fish and drops it in a blender. The audience begins to titter, nervously anticipating what might happen next. When he punches that blender button, turning the fish into puree, the audience loses it, laughing hysterically at what would become one of the most famous SNL sketches in history.Read more
President Biden’s executive order (EO) on cybersecurity, released on May 12, is a sprawling and comprehensive document that aims to redress weaknesses in the digital security ecosystem. It is peppered with nearly 50 actions that the federal government must take within extraordinarily tight timeframes, signaling the urgency of the cybersecurity crisis the country faces.
Several parts of the EO seek to shore up software security. This long-overlooked and arcane topic has taken on new urgency following the SolarWinds and Microsoft Exchange software supply chain hacks.
More cloud computing solutions, remote and work-from-home systems and internet-connected devices increase risk from an expanded attack surface. The best way to reduce the number of vulnerabilities is to establish a proper enterprise attack surface management program.
Proper attack surface management requires analyzing operations to discover potential vulnerabilities and understand the landscape. That information should help to develop a plan, but success depends on executing that plan across the organization’s network, systems, channels and touchpoints.
Two-fifths admit alert overload is a significant challengeRead more
There is no such thing as free antivirus. Free antivirus that is concerned with your privacy is also a myth.Read more