You do not have to give your passcode to the police. The courts say it amounts to self-incrimination. The government isn’t really after the password, after all; it’s after any potential evidence it protects. In other words: fishing expedition.
12/15/2015 06:07 PM EST Last revised: October 29, 2018
Because computers play such critical roles in our lives, and because we input and view so much personally identifiable information (PII) on them, it’s imperative to implement and maintain computer security. Strong computer security ensures safe processing and storage of our information. Read the full article to receive all the valuable tips.
11/01/2018 12:20 PM EDT Original release date: November 01, 2018
Website security refers to the protection of personal and organizational public-facing websites from cyberattacks. Cyberattacks against public-facing websites—regardless of size—are common. Read this article for tips on securing yours.
Researchers have published details of a dangerous flaw in the way the hugely popular WooCommerce plugin interacts with WordPress that could allow an attacker with access to a single account to take over an entire site.
Wordfence Threat Intelligence Team has been monitoring attacks that are targeting the recently reported vulnerability in the WP GDPR Compliance plugin. To help developers, security operations staff and other defenders, we have published a technical post that describes the TTPs (tactics, techniques and procedures) and the IOCs (Indicators of Compromise) associated with the attackers.
11/09/2018 01:59 PM EST Original release date: November 09, 2018
VMware has released security updates to address vulnerabilities in ESXi, Workstation, and Fusion. An attacker could exploit these vulnerabilities to take control of an affected system. NCCIC encourages users and administrators to review the VMware Security Advisory VMSA-2018-0027 and apply the necessary updates.
A security researcher has published a zero-day flaw in a commonly-used virtual machine management system without notifying the vendor, justifying it with a scathing critique of the info-sec industry.