Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Yes, There Really Is A Windows 11

Microsoft announces Windows 11, with a new design, Start menu, and more. A new version of Windows is officially on the way.


Urgent Alert –  WD My Book Live users wake up to find their data deleted

Storage-device maker advises customers to unplug My Book Lives ...

Continue Reading →
0

Guest Post – What exactly does “code obfuscation” imply?

Code obfuscation is the process of modifying an executable so that it is no longer valuable to a hacker while remaining fully functioning. Although the procedure may alter method instructions or metadata, it has no impact on the program’s output. To be clear, practically any code can be reverse-engineered with enough time and effort. On a number of ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Colonial Pipeline CEO: Paying Ransom ‘Right Thing to Do for the Country’

The Colonial Pipeline ransomware saga continues to unfold before our eyes. This week, company CEO Joseph Blount admitted to paying $4.4 million in ransom to cybercriminals following the attack that shut down the largest fuel pipeline in the U.S. In an interview with the Wall ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Some good news for a change.

3 Native American tribes use Nokia tech to bring 4G and 5G to remote towns in four states

Tribes in Oklahoma, North and South Dakota, and California will use hardware originally designed for private 5G networks.


FBI-DHS-CISA Joint Advisory on Russian Foreign Intelligence Service Cyber Operations

Original release date: April ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


3 ways the CI/CD approach to software has made work better for developers

The software industry has gotten much better at breaking big projects down into smaller chunks, according to one CTO.  (CISSP Domain 8)


When cryptography attacks – how TLS helps malware hide in plain sight

No IT technology feels quite as much of ...

Continue Reading →
0
Page 3 of 3 123