End of An Era As Kelihos Botnet Operator Jailed
A Russian man pleaded guilty this week to running Kelihos, a botnet that for years helped facilitate a lengthy spam and credential-harvesting campaign.
A Russian man pleaded guilty this week to running Kelihos, a botnet that for years helped facilitate a lengthy spam and credential-harvesting campaign.
A Russian man pleaded guilty this week to running Kelihos, a botnet that for years helped facilitate a lengthy spam and credential-harvesting campaign.
SAP released its monthly critical patch update for September this week, fixing 14 vulnerabilities, including some that could have allowed users to access restricted data or cause a database server to crash.
The U.S. Department of Health and Human Services' Office for Civil Rights recently detailed steps organizations should take to secure protected health information (PHI) on electronic media and devices.
Learn about the Chief Compliance Officer role in Data Protection 101, our series on the fundamentals of information security.
Learn about the Chief Compliance Officer role in Data Protection 101, our series on the fundamentals of information security.
18 security pros share their top tips and best practices for securing a remote workforce.
18 security pros share their top tips and best practices for securing a remote workforce.
18 security pros share their top tips and best practices for securing a remote workforce.
Researchers have published a paper on a new side-channel attack that essentially turns Android devices into sonar systems. It allows attackers, via acoustic signals, to track a person's finger movements on devices, something which could allow them to capture sensitive data, like passwords.