Microsoft has released SimuLand, an open-source project which aims to help security teams reproduce known attack scenarios – and test...
With major cyber attacks on critical infrastructure such as the SolarWinds attack, the Florida’s water treatment facility hack, and the...
We have developed and tested a secure new computer processor that thwarts hackers by randomly changing its underlying structure, thus...
A new study from Dragos has found that a water treatment plant in Oldsmar, Florida — where hackers attempted to...
Despite the obvious benefits of contemporary cloud-based, mobile application development solutions—such as cloud storage, notification management, real-time databases, and analytics—many...
US insurance company CNA Financial has reportedly handed over $40 million to a ransomware gang in order to buy back...
Image: Getty Images/iStockphoto The Australian Communications and Media Authority (ACMA) has issued formal notices to a trio of telcos after...
The last time Apple updated its Apple TV streaming box was in September of 2017. Since then, Apple has continued...
The Research Brief is a short take about interesting academic work. The big idea We have developed and tested a...
Cyberattackers on average have 11 days after breaching a target network before they’re being detected, according to UK security firm...
LogMeIn is making it easier for businesses and consumers to take advantage of multi-factor authentication (MFA) with the release of...
This year’s I/O event from Google was heavy on the “we’re building something cool” and light on the “here’s something...












