Yahoo Tells SEC It Knew About Data Breach in 2014
Siemens Discloses Local Privilege Escalation Bug in SCADA Gear
Signal Audit Reveals Protocol Cryptographically Sound
Cloud Security

Cloud Security

One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very…

Facebook suspends plans to collect WhatsApp user data in the UK
WoT pulls browser extension after privacy failure
Tech support scammers bite Chrome users with forgotten 2014 bug
November Patch Tuesday fixes controversial Windows 0-day hole
Google hits incorrigible sites with “Repeat Offender” tag
General Motors To Lay Off 2,000 Workers at Two US Plants