Security | News, how-tos, features, reviews, and videos
Those who make assumptions -- trusting that solutions won't fail and users won't click -- could leave a company's assets vulnerable and lead to a breach
The bill would require law enforcement to get a warrant to read mails older than 180 days
The two open source tools check for cyptographic keys and other sensitive information in code saved on GitHub and offers warnings if secrets are at risk
Truffle Hog can find access tokens and keys that are 20 characters or longer inside source code repositories
Ransomware is lucrative, and attackers looking for new ways to extort enterprises are going after data stored on web and app servers, even SaaS apps
Forget expired TLS certificates; the lightweight Caddy web server handles Let's Encrypt certificates and redirects HTTP traffic by default
There are not enough cybersecurity grads to fill cybersecurity job openening. IT workers need to be cross-trained to fill the positions, and it won't be easy
Five groups of attackers are competing to delete as many publicly accessible MongoDB databases as possible
Major changes are coming to telecom, in the form of more mergers, less competition, and other regulatory shifts
Major companies like Apple, Uber, and Yelp regularly offer bounties -- some as high as $200,000 -- but there can be drawbacks