
A good reason to update Confluence
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
459 articles
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
Examples of password policies that will have users tearing their hair out — and why you shouldn’t employ them.
We look at a new sophisticated attack on AMD and Intel integrated graphics cards.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
A few words on why desktop applications based on the Electron framework should be approached with caution.
Why the Windows system time can suddenly change, and how to stop it from happening.
Why criminals want to hack your website, how they might use it in new attacks, and how to stop them.
Some thoughts on what PC software patches should be prioritized and why.
Gadgets to help protect employees’ devices against hackers and other threats.
What caused a mass vulnerability in VPN clients, and how to keep them working.
It means that some companies still have not installed MS Office patches that were published 5 years ago.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
July Microsoft Patch Tuesday: a collection of exploited vulnerabilities.
SMBs and corporations are increasingly outsourcing certain IT responsibilities, though it is not usually a one-size-fits-all solution.
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
Researchers have come up with a way to exfiltrate confidential data by observing LED activity.
How scammers can hack your YouTube channel without knowing a password and second factor.
Website names in the ZIP and MOV domains are indistinguishable from file names. How will this affect IT systems, and what will threat actors do?