In response to ongoing cybersecurity events, the National Security Agency (NSA) released a Cybersecurity Advisory Thursday “Detecting Abuse of Authentication Mechanisms.” This advisory provides guidance to National Security System (NSS), Department of Defense (DoD), and Defense Industrial Base (DIB) network administrators to detect and mitigate against malicious cyber actors who are manipulating trust in federated authentication environments to access protected data in the cloud.


The current lawsuit was announced by Colorado’s Attorney General Phil Weiser but 38 states are signatories. The big issue is alleged suppression of competition.


Data analytics isn’t just for large organizations anymore. As businesses and community collectives increasingly move their operations into digital spaces, the vast amounts of data being collected pose an opportunity for them to get to know their stakeholders better.


In one of his most famous studies, 54 volunteers were served tomato soup. Half were served from normal bowls and half from “bottomless bowls” which had hidden tubes that imperceptibly refilled the bowls.


For all its breadth, depth, and skillful insertion via the supply chain, the latest hack of critical departments of the U.S. government—and of many leading corporations from around the world — should come as no surprise.


As domains get cheaper, account takeovers get easier, and cloud computing usage expands, email-borne attacks will take advantage.


One of the long awaited benefits of RouterOS version 7 is a new routing protocol stack that enables new capabilities and fixes limitations in RouterOSv6 caused by the use of a very old Linux kernel.


Let’s face it–Most enterprises aren’t building their own Internet of Things (IoT) systems. Very few organizations have the scale to develop and deploy IoT devices of their own in their environments — the hardware tends to be specialized, most of the software doesn’t look like the stuff their corporate horde of Java developers use to write code, and there just isn’t enough value for risky projects like that to make sense.


The US Cybersecurity Infrastructure and Security Agency (CISA) has warned of critical vulnerabilities in a low-level TCP/IP software library developed by Treck that, if weaponized, could allow remote attackers to run arbitrary commands and mount denial-of-service (DoS) attacks.


The May 2017 WannaCry ransomware attack caused a great deal of damage across Europe and Asia, wreaking particular havoc with Britain’s National Health Service. The attack exploited a Microsoft Windows vulnerability that had been discovered and exploited by the U.S. National Security Agency.


The following are the most important current trends that will be affecting the telecom industry in 2021.


Over the last few years, the idea of patching systems to correct flaws has graduated from an annoying business disruption to a top priority. With all of the notorious vulnerabilities that can wreak total havoc, the time it takes to patch becomes a minor inconvenience when weighed against both the technical challenges and possible regulatory penalties of not patching.


More than 100,000 Zyxel firewalls, VPN gateways, and access point controllers contain a hardcoded admin-level backdoor account that can grant attackers root access to devices via either the SSH interface or the web administration panel.


On December 31, Flash died. Adobe stopped updates and now recommends you uninstall it. This end has been a long time coming—since June 2017, officially; unofficially, since April 2010, when Apple’s Steve Jobs announced that Flash would not run on the iPhone.


If you’re reading this, you might have read the juicy piece that Elle dropped this weekend chronicling how a former Bloomberg reporter torched her entire career after falling for the longtime subject of her reporting—professional-tool-turned-convicted-securities-fraudster Martin Shkreli. And if you know about that article, you probably know about The Ad.


In retail locations surveillance cameras have given way to unobtrusive “beacons” spaced out in the store. That helpful app from your favorite retailer that shows you where to find items, also communicates with the beacon to track your footsteps and collect data on your shopping behavior.