[unable to retrieve full-text content]
How can cryptojacking attacks in Chrome be stopped?
[unable to retrieve full-text content]
What are the implications of DNS over HTTPS for privacy?
[unable to retrieve full-text content]
The aftermath of the Gentoo GitHub hack
Gentoo GitHub hack: What happened? Late last month (June 28), the Gentoo GitHub repository was attacked after someone gained control of an admin account. All access to the repositories was soon removed from Gentoo developers. Repository and page content were altered. But within 10 minutes of the attacker gaining access, someone noticed something was going […]
What effect does GDPR have on the WHOIS database?
[unable to retrieve full-text content]
How did an old, unpatched Firefox bug expose master passwords?
[unable to retrieve full-text content]
While no one was looking, California passed its own GDPR
The European Union’s General Data Protection Regulation (GDPR) is widely viewed as a massively expensive and burdensome privacy regulation that can be a major headache and pitfall for American firms doing business in Europe. Many firms, including Facebook, have sought ways around the law to avoid having to deal with the burden of compliance. Well, […]
Pulse Secure VPN enhanced to better support hybrid IT environments
The workplace is changing rapidly as employees embrace mobility, applications are in the cloud, and Internet of Things (IoT) devices are instrumented for continuous connectivity — and this is affecting how organizations must think about secure access. Regardless of the scenario, organizations want solutions that deliver better productivity for whomever (or whatever) is connecting, a […]
The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34
In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.
Strange and scary IoT hacks
Here’s the Thing … Image by Ivanastar / Getty Images To read this article in full, please click here