New research shows cloud apps are climbing, SMS authentication is falling, Chrome is the enterprise browser favorite, and Android leads outdated devices....
With some security best practices, enterprises can significantly reduce the chances that a potential supply chain attack will affect business operations....
The Zoom conferencing app has a vulnerability that allows someone to remotely take over the computer's camera.
It's a bad vulnerability, made worse by the fact that it remains even if you uninstall the Zoom ap...
For at least the past decade, a computer crook variously known as “Yalishanda,” “Downlow” and “Stas_vl” has run one of the most popular “bulletproof” Web hosting ...
The group of more than 1,400 top elected municipal officials takes the admirable, recommended stance against paying ransoms. However, can towns and cities secure their information technology infrastructure to w...