Cyber Warfare: Understanding New Frontiers in Global Conflicts
Congress Votes Unanimously to Ban Brokers Selling American Data to Enemies
Microsoft Faces Bipartisan Criticism for Alleged Censorship on Bing in China
U.S. Sues Apple, Alleges Tech Giant Exploits Illegal Monopoly
…Apple’s Imessage Encryption Puts Its Security Practices in the DOJ’s Crosshairs
U.S. Department of Transportation Opens Review Into How Largest U.S. Airlines Use Personal Information
Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds
Krebs: The Not-so-True People-Search Network from China
Fake Obituary Sites Send Grievers to Porn and Scareware Pages | Russia Hackers Using TinyTurla-NG to Breach European NGO’s Systems
Evasive Sign1 Malware Campaign Infects 39,000 WordPress Sites
Researchers Find Over 800 npm Packages with Discrepancies, 18 Exploitable to ‘Manifest Confusion’
AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
KDE Advises Extreme Caution After Theme Wipes Linux User’s Files
Exploit Released for Fortinet RCE Bug Used in Attacks, patch Now
Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug
Security Researchers Win Second Tesla At Pwn2Own
The New CISO: Rethinking the Role to Protect From Attacks |