The security skills shortage is here, here’s how to prepare… Story on TechRepublic
Author: ceadmin
2023 Could Be a Security Nightmare. Here’s Why.
Could be a nightmare? Try WILL be a nightmare… Story on PCMag
What is VPN split tunneling and should I be using it?
A VPN is a service that protects your privacy and security by encrypting your all of your traffic and hiding your… Story on ZDNet
LinkedIn has massively cut the time it takes to detect security threats. Here’s how it did it
Protecting against phishing, malware and other cyber threats is a difficult cybersecurity challenge for any organization. Story on ZDNet
Hackers Use Trojanized Windows 10 to Infiltrate Ukrainian Government
To infiltrate the Ukrainian government, a group of hackers resorted to circulating Windows 10 installers over torrents that were secretly rigged… Story on PCMag
These hackers used Microsoft-signed malicious drivers to further their ransomware attacks
Security firms have reported that multiple hacking groups have been using drivers signed by Microsoft in a series of attacks… Story on ZDNet
Is Your Password Manager Lying to You?
I recently received an email from a reader who aggressively accused the password manager industry of lying, and further accused PCMag of abetting… Story on PCMag
Improper use of password managers leaves people vulnerable to identity theft
A recent report from security advice site Security.org looks at the ways people try to handle their passwords… Story on TechRepublic
How Our Behavioral Bad Habits Are a Community Trait and Security Problem
Many an article chronicles hacked passwords available in bulk on the evil "Dark Web." It’s presented as evidence that the bad behavior of users is the root of… Story on Dark Reading
Prosecutors charge 6 people for allegedly waging massive DDoS attacks
Federal prosecutors on Wednesday charged six people for allegedly operating websites that launched millions of powerful distributed… Story on Ars Technica