A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization. Read More ▶ |
|
| White Paper: Hitachi ID Systems, Inc. Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶ | The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports. Read More ▶ |
| Over 30 hours of digital content across 399 lectures, which can be viewed on your computer or mobile device. Read More ▶ |
| Hundreds of HP inkjet printer models are in desperate need of firmware patches before hackers start exploiting vulnerabilities to gain remote code execution. Read More ▶ |
| | Avast-owned Piriform reverted to a previous version of CCleaner in response to user outrage over its new data collection policy that had no privacy options. Read More ▶ |
| Becoming a certified ethical hacker, also called a penetration tester, is a popular goal among information security professionals. Here are your best options for reaching it. Read More ▶ |
| Want a more effective IT security strategy? Dispel your CEO and senior management of these common cybersecurity misconceptions. Read More ▶ |
| White Paper: Bronze Drum Consulting Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More ▶ | Editor’s Picks | |
|
|
|