All posts in Security News

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

Microsoft recently announced its first Android security tooling. But what is it for, and should you deploy it to your users? Microsoft’s range of Defender Advanced Threat Protection endpoint security tools recently added a new family member, with the preview release of Microsoft Defender ATP for Android. Following on from . . . Read more

Commentary: There simply aren’t enough data scientists to go around, forcing companies to get creative in how they find data science talent. Image: iStock/SergeyNivens For years we’ve been told that data science is the future; that artificial intelligence (AI) and machine learning (ML) will enable us to automate everything. And . . . Read more

The United States Department of Justice has extradited two criminals from the Republic of Cyprus—one is a computer hacker suspected of cyber intrusions and extortion, and the other is a money launderer with known connections to the terrorist organization Hezbollah. Both suspects—Joshua Polloso Epifaniou, 21, a resident of Nicosia, and . . . Read more
The Identity Theft Resource Center doesn’t expect the trend to last, however While cybercriminals have been busy targeting people with various flavors of COVID-19-related scams, the number of publicly reported data breaches in the United States in the first half of 2020 dropped by 33% year-on-year. This is according to a report . . . Read more
GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has awarded $8.9 million for high-impact biopharmaceutical manufacturing projects to support the nation’s response to the COVID-19 pandemic. Authorized by the Coronavirus Aid, Relief, and Economic Security (CARES) Act signed by President Donald Trump in . . . Read more
Cybercrime puts America’s competitive edge and economic future at risk; however, there is some debate as to the extent that this activity is impacting economic activity. Many have questioned the validity of estimates of cybercrime losses, concluding that “they are so compromised and biased that no faith whatever can be . . . Read more
The maintenance of machinery in the manufacturing industry consists of three primary approaches: reactive, preventive, and predictive. Reactive maintenance is when a manufacturer runs the machinery until it breaks down and requires maintenance. Preventive maintenance is when maintenance is scheduled based on time or cycles. This is similar to changing . . . Read more

Commentary: Cyral has been on a roll with two open source projects designed to make security a natural part of the development workflow. Image: metamorworks, Getty Images/iStockphoto Moving database applications to the cloud has been a boon for development teams anxious to move faster. It has also, however, exposed security . . . Read more