Researchers at Check Point Research said the Windows-based malware variant known as Formbook has been upgraded to infiltrate Mac computers.
ZDNet From ACM TechNews | August 3, 2021
Microsoft offers a workaround to a bug that could give attackers the ability to copy an organization's password hashes for offline cracking.
ZDNet From ACM News | July 23, 2021
The Mozilla Web browser's newly-launched Rally data sharing platform is designed to strengthen users' data privacy.
ZDNet From ACM TechNews | July 1, 2021
In a JumpCloud survey of IT decision-makers at small and medium-sized enterprises, 56% think their organizations are spending too much to enable remote work.
ZDNet From ACM TechNews | June 28, 2021
The average time to correct critical cybersecurity vulnerabilities grew from 197 days to 205 days between April and May 2021, according to WhiteHat Security.
ZDNet From ACM TechNews | June 25, 2021
Industry analysts believe that the global chip shortage is creating the perfect environment for counterfeit semiconductors to enter the market.
ZDNet From ACM News | June 15, 2021
Microsoft has issued a warning over RevengeRAT, a remote access tool that has been used to target aerospace and travel industries with spear-phishing campaigns....ZDNet From ACM TechNews | May 18, 2021
One 'boring but really important' change could improve your security posture significantly. But not everyone does it.
ZDNet From ACM News | May 12, 2021
More than 200 organizations across Belgium, including the government and parliament, were affected by a DDoS attack that overwhelmed them with bad traffic.
ZDNet From ACM News | May 5, 2021
A Microsoft security research unit discovered a number of poor memory allocation operations in code used in Internet of Things and operational technology.
ZDNet From ACM TechNews | May 3, 2021
The law enforcement agency is working with the data breach service to alert people that their information may have been harvested by the botnet.
ZDNet From ACM News | April 28, 2021
Detailed by researchers at Forescout, the Name:Wreck vulnerabilities could allow attackers to control devices and remotely execute code, act as a gateway to the...ZDNet From ACM News | April 13, 2021