Information Security (Page 69)

Building secure applications requires much more than just the knowledge of developers, as a properly protected environment requires an adequate analysis and the use of good security tools. That isRead More →

Cybersecurity specialists report the detection of a critical vulnerability in Apple AirTag whose exploitation would allow threat actors to find the phone number of a target user and even redirectRead More →

Cybersecurity specialists report the detection of a critical vulnerability in Windows Platform Binary Table (WPBT) whose exploitation would allow threat actors to perform great damage on Microsoft systems launched fromRead More →

Let’s Encrypt is currently the most important certification authority for Transport Layer Security (TLS) encryption thanks to its sophisticated automated processes for validating, signing, installing and renewing certificates for secureRead More →

According to a report by security firm Comparitech, the confidential information of more than 106 million tourists in Thailand was exposed on the Internet without any protection, leaking confidential recordsRead More →

Ransomware groups are always looking for ways to make their attacks more efficient, which involves doing as much damage as possible to victims. According to recent security reports, the GriefRead More →

Most users of computers, smartphones, and other technology deployments ignore many functions of these devices and the proper methods to protect the information they contain, demonstrating the lack of efficientRead More →