Read Olga V. Mac and Katia Bloom explain law firm cyber security on Above The Law : If you were a hacker trying to decide your next target, you’d likely want to pick an entity that has highly valuable and useful information that, simultaneously, lacks an effective security program. Read their full article here.
April 19, 2018
October 5, 2017
- Millions of Chrome Users Have Installed Malware Posing as Ad Blockers
- First Public Demo of Data Breach via IoT Hack Comes to RSAC
- New iOS Vulnerability Lets Attackers Hack iPhone, iPad
- Bad Decisions: Google Screws Over Tools Evading Internet Censorship Regimes
- Free endpoint scanning service powered by Open Threat Exchange