Microsoft Dev Box will make it easier for developers and hybrid teams to get up and running with workstations already preconfigured with required applications and tools.
Malware-Infested Smart Card Reader
Brian Krebs has an interesting story of a smart ID card reader with a malware-infested Windows driver, and US government employees who inadvertently buy and use them. But by all accounts, the potential attack surface here is enormous, as many federal employees clearly will purchase these readers from a myriad of online vendors when the… Continue reading Malware-Infested Smart Card Reader
Merkury Smart WiFi Camera Review
The Merkury Smart WiFi Camera is an affordable choice for adding a security camera to your home. See how it stacks up in our full review. The post Merkury Smart WiFi Camera Review appeared first on SafeWise.
Microsoft security vulnerabilities drop after five-year rise
While elevated privilege attacks remain a critical security concern when using Microsoft products, a new report says that the raw number of vulnerabilities is dropping.
Forescout Launches Forescout Frontline to Help Organizations Tackle Ransomware and Real Time Threats
New threat hunting and risk identification service provides organizations with an enterprise-wide baseline of their threat landscape and risk exposure.
Manipulating Machine-Learning Systems through the Order of the Training Data
Yet another adversarial ML attack: Most deep neural networks are trained by stochastic gradient descent. Now “stochastic” is a fancy Greek word for “random”; it means that the training data are fed into the model in random order. So what happens if the bad guys can cause the order to be not random? You guessed… Continue reading Manipulating Machine-Learning Systems through the Order of the Training Data
Most Affordable Medical Alert Systems
Medical alert systems can save lives, but how much do they cost? We compared the prices of top brands to find out. The post Most Affordable Medical Alert Systems appeared first on SafeWise.
Workers planning ‘bleisure’ trips this summer spur travel demand
Travelers who plan to work at least part of the time while on summer vacation this year are creating increased travel demand, according to a new study by business consultancy Deloitte. The report examined travelers’ behaviors and preferences, and showed travel concerns over COVID-19 have waned. Those concerns, however, have been replaced by financial worries, with… Continue reading Workers planning ‘bleisure’ trips this summer spur travel demand
‘There’s No Ceiling’: Ransomware’s Alarming Growth Signals a New Era, Verizon DBIR Finds
Ransomware has become so efficient, and the underground economy so professional, that traditional monetization of stolen data may be on its way out.
The Justice Department Will No Longer Charge Security Researchers with Criminal Hacking
Following a recent Supreme Court ruling, the Justice Department will no longer prosecute “good faith” security researchers with cybercrimes: The policy for the first time directs that good-faith security research should not be charged. Good faith security research means accessing a computer solely for purposes of good-faith testing, investigation, and/or correction of a security flaw… Continue reading The Justice Department Will No Longer Charge Security Researchers with Criminal Hacking