Scammers are using Twitter as a vehicle to target people looking for customer support or asking general questions. They interject themselves into legitimate discussions, offering friendly chatter and a link that directs the target to a Phishing page designed to harvest credentials. Read More ▶ |
|
| White Paper: AppDynamics DevOps has taken the IT world by storm over the last few years and continues to transform the way organizations develop, deploy, monitor, and maintain applications, as well as modifying the underlying infrastructure. DevOps has quickly evolved from a niche concept to a business imperative and companies of all sizes should be striving to incorporate DevOps tools and principles. Read More ▶ | Why web browsers leave security engineers constantly playing defense. Read More ▶ |
| The U.S. might add other airports to its ban restricting passengers from bringing laptops on board certain flights from the Middle East. Read More ▶ |
| | Open Web Application Security Project (OWASP) has released a set of best practices for the secure deployment of those devices. Read More ▶ |
| Endpoint security vendor F-Secure has acquired a behavior-based security application for macOS called Little Flocker that was developed by an independent researcher. Read More ▶ |
| A group of what appears to be Chinese hackers infiltrated a U.S. trade-focused lobbying group as the two countries wrestle with how they treat imports of each other's goods and services. Read More ▶ |
| Attackers are exploiting a vulnerability patched last month in the Apache Struts web development framework to install ransomware on servers. Read More ▶ |
| White Paper: CA Technologies This EMA white paper offers clarity into selecting Application Performance Management and End User Experience solutions. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|