System Security

How Are ASU Scientists Shaping the Future of Cybersecurity?
Infrastructure & Network Security How Are ASU Scientists Shaping the Future of Cybersecurity?

The rapid integration of technology in our daily lives has ushered in a new era of cybersecurity challenges. In response, a trio of researchers from Arizona State University’s Global Security Initiative's Center for Cybersecurity and Trusted Foundations is pioneering innovative approaches to p

How Will Biometric Technology Transform Security and Digital Services?
Infrastructure & Network Security How Will Biometric Technology Transform Security and Digital Services?

Biometric technology is revolutionizing the way we approach security and digital services. The need for robust and efficient authentication methods has never been more pressing as cyber threats escalate and digital transactions proliferate. As we dive into the impact of this innovative technology,

How to Manage macOS Security Settings for Apps and Developer Tools
Infrastructure & Network Security How to Manage macOS Security Settings for Apps and Developer Tools

macOS Sequoia is equipped with a variety of security settings designed to protect users from potentially harmful software and unauthorized system modifications. Even though macOS is considered one of the most secure operating systems worldwide, it still offers options to tweak settings for users

How Is Ecobee Enhancing Smart Home Security with Yale and August?
Infrastructure & Network Security How Is Ecobee Enhancing Smart Home Security with Yale and August?

Ecobee is making significant strides in the smart home market by integrating Yale and August smart locks into its Ecobee Smart Security platform. This move aims to provide a cohesive and user-friendly experience by allowing homeowners to control various security devices from a single application.

CISA Adds SolarWinds WHD Bug to Exploited Vulnerabilities Catalog
Malware & Threats CISA Adds SolarWinds WHD Bug to Exploited Vulnerabilities Catalog

The cybersecurity landscape is ever-evolving, with both defenders and attackers continually escalating their tactics. Recent developments have emphasized the importance of addressing critical vulnerabilities promptly to mitigate risks. One such significant update comes from the Cybersecurity and

Cyberattackers Use Fake Google Meet Errors in Sophisticated Malware Scam
Infrastructure & Network Security Cyberattackers Use Fake Google Meet Errors in Sophisticated Malware Scam

In a recent turn of events, cyberattackers have begun utilizing fake Google Meet error messages as part of an elaborate social engineering campaign known as ClickFix. This campaign aims to disseminate info-stealing malware by banking on users' trust in widely-used platforms like Google Meet.

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later