-
New Lenovo Notebook Models Affected By UEFI Firmware Vulnerabilities
PRIVACY PRIVACY The flaws affect various Lenovo Yoga, IdeaPad and ThinkBook devices Read More
-
#IRISSCON: Police Officer Urges More Reporting and Engagement to Tackle Cybercrime
PRIVACY PRIVACY Ireland’s National Cyber Crime Bureau outlines cybercrime trends being observed in law enforcement Read More
-
Majority of Security Managers Lack Threat Intelligence Skills
PRIVACY PRIVACY The report suggests threat intelligence is a crucial source for vulnerability detection Read More
-
The ‘Great Resignation’ Caused Insider Threats to Peak in Q3 2022, Kroll Finds
PRIVACY PRIVACY Kroll’s Q3 2022 Threat Landscape report showed an unprecedented increase in insider threats Read More
-
Update your Lenovo laptop’s firmware now! Flaws could help malware survive a hard disk wipe
PRIVACY PRIVACY PC manufacturer Lenovo has been forced to push out a security update to more than two dozen of its laptop models, following the discovery of high severity vulnerabilities that could be exploited by malicious hackers. Security researchers at ESET discovered flaws in 25 of its laptop models – including IdeaPads, Slims, and ThinkBooks…
-
An Untrustworthy TLS Certificate in Browsers
PRIVACY PRIVACY The major browsers natively trust a whole bunch of certificate authorities, and some of them are really sketchy: Google’s Chrome, Apple’s Safari, nonprofit Firefox and others allow the company, TrustCor Systems, to act as what’s known as a root certificate authority, a powerful spot in the internet’s infrastructure that guarantees websites are not…
-
#IRISSCON: Cyber Professionals Now Tasked with Securing Society, Says Mikko Hyppönen
PRIVACY PRIVACY Mikko Hyppönen discusses how cyber-threats will become even more dangerous as reliance on connectivity grows Read More
-
What Is Smishing and Vishing, and How Do You Protect Yourself?
PRIVACY PRIVACY Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text message, email, or voicemail. These scams are becoming increasingly popular as cybercriminals try to take advantage of people who are more likely to fall for them, such as those who aren’t as familiar…
-
The pros and cons of the digital transformation in banking
PRIVACY PRIVACY The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Digital transformation in banking began following the creation of the internet in the 1990s as a way for banks to deliver…
-
Some 98% of Global Firms Suffer Supply Chain Breach in 2021
PRIVACY PRIVACY Two-fifths still trust suppliers to handle their own security Read More