Archive for the ‘Security vulnerabilities’ Category

Good Cyber Hygiene in a Post-Pandemic World Starts with Us

Three ways that security teams can improve processes and collaboration, all while creating the common ground needed to sustain them. Source: Good Cyber Hygiene in a Post-Pandemic World Starts with Us Cyber ‘hygiene’ could resolve 90% of cyber attacks | FT Business Notebook Download a Security Risk Assessment steps paper! Download a vCISO template Subscribe […]

Leave a Comment

Flaws in device drivers from 20 vendors allow hackers to install a persistent backdoor

Researchers discovered multiple flaws in more than 40 drivers from at least 20 different vendors that could to install a persistent backdoor on Windows PCs. Source: Flaws in device drivers from 20 vendors allow hackers to install a persistent backdoor The security flaw in more than 40 Device Drivers from 20 hardware vendors Subscribe to […]

Leave a Comment

The scramble to secure America’s voting machines

Paperless voting devices are a gaping weakness in the patchwork U.S. election system, security experts say. But states and counties are making uneven progress in replacing them, a POLITICO survey reveals. Source: The scramble to secure America’s voting machines America’s Voting Machines Are Extremely Vulnerable to Hacking | NowThis Enter your email address: Delivered by […]

Leave a Comment

These are the top ten security vulnerabilities most exploited by hackers | ZDNet

But one simple thing could help stop the vast majority of these attacks, say researchers. Source: These are the top ten security vulnerabilities most exploited by hackers | ZDNet

Leave a Comment