Electric Vehicle Charging: The Next Cyberattack Frontier
By Prof. Thomas R. Köhler, Member of the Board of Juice Technology AG The International Energy Agency estimates […] The…
By Prof. Thomas R. Köhler, Member of the Board of Juice Technology AG The International Energy Agency estimates […] The…
UL’s SafeCyber will allow organizations to manage cybersecurity governance and processes as well as speed up time spent on firmware…
The United States Department of Justice today has announced charges against a REvil ransomware affiliate responsible for the attack against…
Now that Netflix is offering mobile games on Android, there’s a lingering question: how will...
Microsoft is trying to nudge more people toward newer Windows versions. As Thurott reports, Microsoft...
The US CISA shared a list of vulnerabilities known to be exploited in the wild and orders US […] The…
Google and Salesforce executives discuss the need for the newly released MVSP, how tech companies came together to work on…
Growing numbers of network engineers turn to this IT mindset to address mounting concerns of network safety in […] The…
Trend Micro's ZDI has awarded $1,081,250 for 61 zero-days exploited at Pwn2Own Austin 2021, with competitors successfully pwning the Samsung Galaxy S21…
The evolution of agile development and infrastructure-as-code has given security teams the tools they need to gain visibility, find vulnerabilities…