The Other Virus Threat: Surge in COVID-Themed Cyberattacks
It may look like an email from a supervisor with an attachment on the new “work from home policy.” But it could be a cleverly…
It may look like an email from a supervisor with an attachment on the new “work from home policy.” But it could be a cleverly…
The U.S. Senate has voted to extend, rather than tweak, three surveillance powers that federal law enforcement officials use to fight terrorists, passing the bill…
Researchers have discovered 16 types of vulnerabilities, including many backdoors, in Zyxel’s CloudCNM SecuManager network management software. The vendor has confirmed the flaws and says…
The kids are alright, except for the ones who are not.
Vecnos wants to make 360-degree content mainstream, starting with its first compact and wand-like camera.
FireEye’s incident response division Mandiant observed more than 500 new malware families last year, the company revealed in its M-Trends 2020 report released this week….
Fidelis Cybersecurity has announced a raft of enhancements to its Fidelis Elevate platform, which comprises a network product, an endpoint product, and a deception product….
A vulnerability addressed by F-Secure in some of its business products could have been exploited to bypass their scanning engine using malformed archives. read more
Critical vulnerabilities addressed in the Accusoft ImageGear library could be exploited by remote attackers to execute code on a victim machine, Cisco Talos’ security researchers…
The new collection, a collaboration with Teenage Engineering, has its own set of 3D-printable accessories.
A bug in the Google Takeout download service has resulted in some users’ videos being inadvertently shared with other people. read more
Twitter unveiled a plan Tuesday to curb the spread of manipulated content including “deepfake” videos as part of a move to fight misinformation which could…