Ahead of GDPR, Information Governance Comes into Its Own
A full 98 percent of US enterprises have embarked on information governance (IG) projects, dramatically up from just 10 percent last year. READ MORE HERE…
A full 98 percent of US enterprises have embarked on information governance (IG) projects, dramatically up from just 10 percent last year. READ MORE HERE…
A pen-tester has found five vulnerabilities in Dell EMC RecoverPoint devices, including a critical RCE that could allow total system compromise. READ MORE HERE…
A bug in Comcast’s activation website for its Xfinity routers leaked sensitive customer data. READ MORE HERE…
A bug in Comcast’s activation website for its Xfinity routers leaked sensitive customer data. READ MORE HERE…
A botnet called Brain Food is pushing diet pills via infected WordPress and Joomla websites. READ MORE HERE…
The vulnerability allows an attacker to execute a malware or other payloads on a client machine by sending malicious messages from the DHCP server. READ MORE HERE…
The main purpose of Grobios malware is to help attacker establish a strong, persistent foothold in a victim’s system, in order to drop additional payloads later. READ MORE HERE…
Researchers found an array of vulnerabilities in the Logitech Harmony Hub, shedding light on IoT security. Read More HERE…
Tech-support scams took off during the year, while whaling/business email compromise was the main threat, accounting for losses of more than $675 million. Read More HERE…
The two have been arraigned in a Georgia district court on charges relating to an elaborate voice- and SMS-phishing (i.e., vishing/smishing) scheme. Read More HERE…