ICO’s data revealed a signficant growth in ransomware attacks last year
NCSC Updates Code of Practice for Smart Building Security
New document has been rewritten for the connected era
State-Backed Chinese Hackers Target Russia
Google claims state actors are using Ukraine war as a phishing lure
What happens to your MIT digital presence after graduation
If you are graduating from MIT this month, congratulations! This also means it’s time to start preparing for life after commencement. “Offboarding” is the process of transitioning and closing out your digital presence at MIT. It is important that you d…
Former eBay Exec Pleads Guilty to Cyber Stalking
eBay’s former senior director of safety and security admits role in fetal pig harassment campaign
Former eBay Exec Pleads Guilty to Cyber Stalking
eBay’s former senior director of safety and security admits role in fetal pig harassment campaign
NortonLifeLock Willfully Infringed Malware Patents
Jury finds cybersecurity company violated Columbia University’s rights over two patents
Ransomware Attack Closes Michigan College
Cyber-attack forces Kellogg Community College to cancel classes at five campuses
Zero Trust and the Fallacy of Secure Networks
Talking about secure networks is like talking about safe pools. A pool is just a body of water, and if it has enough water to swim in, then it has more than enough water to drown in. A pool is inherently unsafe. We, therefore, take care in how we use a…