VivaVideo, Chinese "spyware" app with at east 100 million installs on the Android Play Store, is requesting dangerous permissions, including the ability to read and write files to external drives and an user's specific GPS location.
There’s a good chance that at some point you’ve been watched, scanned, or analyzed by facial recognition technology — potentially without even realizing it, says a new study by Surfshark.
To apply true holistic security best practices and reduce significant risks to the mainframe, security teams must embrace an integrated mainframe security strategy.
The University of Texas-San Antonio has been selected to receive a five-year, $70 million cooperative agreement from the U.S. Department of Energy to establish and lead the Cybersecurity Manufacturing Innovation Institute (CyManII).
ISACA has updated its performance CSX Cybersecurity Practitioner (CSX-P) certification with expanded job tasks that span and test across five key security functions – Identify, Protect, Detect, Respond, and Recover.
Probationary employees—generally those with less than 1 or 2 years of federal service—can be especially vulnerable to reprisal because they have fewer protections from adverse personnel actions, including termination, the Government Accountability Office found.
The US Government Accountability Office reviewed four federal agencies and found that they did not have policies for coordinating assessments with states and none of them had policies for coordinating assessments with each other.