28.6 C

TikTok security flaws exposed user accounts

A cybersecurity firm has called attention to security holes in TikTok that would have allowed hackers to infiltrate the accounts among its billion-plus users. Read more

A CISO’s Security Predictions for 2020

As Threats Continue to Evolve, So too Must DefensesThe cybersecurity outlook for 2020 and the new decade will be characterized by more advanced, targeted and coordinated attack vectors designed...

WannaCry was the top ransomware of 2019

The WannaCry virus was the most prevalent of all ransomware attacks in 2019, according to Precise Security. Read more

Las Vegas Suffers Cyberattack on First Day of CES

The attack, still under investigation, hit early in the morning of Jan. 7. Read more

Major Union Launches Campaign To Organize Video Game, Tech Workers

A new campaign launched Tuesday by one of the nation's largest labor unions -- and spearheaded by one of the leading video game industry activists in Southern California --...

Twitter Will Soon Let You Choose Who Can Reply To Your Tweets

At a press briefing today, executives from Twitter outlined policy changes that'll affect the social network's over 330 million users in the months to come. Twitter product lead Kayvon...

How to fix insecure LDAP binds

Prevent Windows admin credentials from being exposed in cleartext with this tip. Read more

Ivanka Trump, Big Tech Companies Plan Marketing Campaign Targeting Teens’ Perceptions of Tech Jobs

theodp writes: Dismissing questions of whether Ivanka Trump's Tuesday CES keynote appearance on The Path to the Future of Work should have gone to somebody else who's had more...

Tricky Phish Angles for Persistence, Not Passwords

Late last year saw the re-emergence of a nasty phishing tactic that allows the attacker to gain full access to a user’s data stored in the cloud without actually...

The Hidden Cost of Ransomware: Wholesale Password Theft

Organizations in the throes of cleaning up after a ransomware outbreak typically will change passwords for all user accounts that have access to any email systems, servers and desktop...

Latest article


SMC D3G0804W devices allow XSS via the SSID field on the WiFi Network Configuration page (after a successful login to the admin account)....

Are We Secure Yet? How to Build a ‘Post-Breach’ Culture

There are many ways to improve your organization's cybersecurity practices, but the most important principle is to start from the top. Read more

Introducing JetBrains Mono, ‘A Typeface for Developers’

Long-time Slashdot reader destinyland writes: JetBrains (which makes IDEs and other tools for developers and project managers) just open sourced a new "typeface for...