If a locked filing cabinet is stolen along with its key, can you still say it’s locked? GoTo thinks you can
GoTo says that hackers stole its customers' "encrypted backups." But they also say the hackers stole the decryption keys. To say the backups were encrypted...
Hackers steal 10 million customer details from JD Sports
If you've purchased trainers from sports fashion retailer JD Sports in the past, your personal details could now be in the hands of hackers. Read...
USN-5811-3: Sudo vulnerability
USN-5811-1 fixed a vulnerability in Sudo. This update provides the corresponding update for Ubuntu 14.04 ESM. Original advisory details: Matthieu Barjole and Victor Cutillas discovered...
Critical Vulnerability in Control Web Panel Exploited in the Wild
FortiGuard Labs is aware of a report that a patched but critical vulnerability in Control Web Panel (CWP) is being exploited in the wild. The...
NIST Is Updating Its Cybersecurity Framework
NIST is planning a significant update of its Cybersecurity Framework. At this point, it’s asking for feedback and comments to its concept paper. Do the...
9 Ways smart devices can compromise your privacy
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
Fake Money Apps Garner Millions of Android Downloads
Over 20 million users install apps from Google Play Read More
New Yorker Gets Four Years for $9m COVID Fraud Scheme
Woman recruited multiple co-conspirators to help her Read More
Economic headwinds could deepen the cybersecurity skills shortage
According to the most recent research report from ESG and the Information System Security Association International (ISSA), 57% of organizations claim that they’ve been impacted by...
How to survive below the cybersecurity poverty line
The security poverty line broadly defines a divide between the organizations that have the means and resources to achieve and maintain mature security postures to...