Axis Communications builds cyber wall around popular IoT devices
Securing IoT devices must be a top priority from start to finish these days. Whereas the issue used to be see...
Securing IoT devices must be a top priority from start to finish these days. Whereas the issue used to be see...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Google has placed a new open source project on GitHub called OpenSK. It is a multifactor authentication platf...
The Google Bounty program provides financial compensation to finders of vulnerabilities. The program had a re...
Vulnerabilities in several WordPress plugins (including Simple Fields) allow hackers to inject JavaScript cod...
The founder of a company specialising in counteracting and protecting against DDoS attacks has admitted in th...
A new cryptography chip is designed based on chaos theory and should offer perfect secrecy with unbreakable s...
A problem with a Microsoft ElasticSearch database has put 250 million users' data on the street. The settings...
Techzine had an exclusive interview with Fermín Serna, the Chief Information Security Officer (CISO) of Citr...
Citrix and FireEye have announced that they are launching a new tool to combat the security error that has ca...
Oracle recently released its quarterly set of patches to address vulnerabilities within its products. With th...
A critical security vulnerability has been found in Internet Explorer (IE). By exploiting this leak, criminal...