Microsoft kills off security bulletins after several stays

Microsoft this week retired the security bulletins that for decades have described each month’s slate of vulnerabilities and accompanying patches for customers—especially administrators responsible for companies’ IT operations.One patch expert...

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to...

IDG Contributor Network: Why executive orders aren't enough to fix cybersecurity

Cybersecurity has spent a lot of time in the national spotlight over the last year, with major breaches revealed at Yahoo and the DNC, not to mention the thousands of...

US says laptop ban may expand to more airports

The U.S. might add other airports to its ban restricting passengers from bringing laptops and other electronics into the cabin for certain flights from the Middle East.“We may take measures...

FAQ: Are you in danger from the WannaCry ransomware?

The worm called WannaCry (aka WannaCrypt, WannaCry0r, WanaCry, and WCry) dominated tech headlines through the weekend. According to Europol, quoted in the , WannaCry infected  200,000 computers in more than...

Office 365 phishing examples | Salted Hash Ep 10

Salted Hash looks at recent Office 365 phishing examples, discussing why they work and what can be done about them.

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of...

Backup software features that IT managers love and hate

With corporate data more important than ever, selecting the best  for the organization would be a career-enhancing move. According to online reviews by enterprise users in the IT Central Station community,...

Open-source developers targeted in sophisticated malware attack

For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware.The attacks started in...

Hacker takes out dark web hosting service using well-known exploit

A hacker is proving that sites on the dark web, shrouded in anonymity, can easily be compromised.   On Friday, the unnamed hacker began dumping a sizable database stolen from Freedom...

STAY CONNECTED

2,973,060FollowersFollow
13,460,346FollowersFollow
6,670SubscribersSubscribe