The SOC 2 audit: What, how, and why?
Credit to Author: Igor Kumagin| Date: Tue, 20 Aug 2019 15:14:12 +0000
We explain what an SOC 2 audit is, why we passed it, and how it was performed.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Igor Kumagin| Date: Tue, 20 Aug 2019 15:14:12 +0000
We explain what an SOC 2 audit is, why we passed it, and how it was performed.
Read MoreCredit to Author: Kaspersky Team| Date: Mon, 19 Aug 2019 15:42:41 +0000
The truth about the recently discovered — and already fixed — bug in Kaspersky consumer products.
Read MoreCredit to Author: Jeffrey Esposito| Date: Thu, 15 Aug 2019 14:06:17 +0000
Jeff and Dave discuss more cameras in Kings Cross, Twitter accidentally using personal data for ads without permission, Microsoft listening in on Skype, and more.
Read MoreCredit to Author: Leonid Grustniy| Date: Mon, 12 Aug 2019 11:51:00 +0000
Scammers are interested in your photos with ID cards. We explain why and how to stay protected.
Read MoreCredit to Author: Jeffrey Esposito| Date: Thu, 08 Aug 2019 11:56:29 +0000
Jeff and Dave discuss Five Eyes looking to weaken encryption, possible social media changes, Amazon Rings used for surveillance, and more.
Read MoreCredit to Author: Maria Vergelis| Date: Thu, 08 Aug 2019 10:00:36 +0000
Fraudsters are using the feedback forms on the websites of reputable companies to send spam.
Read MoreCredit to Author: Sergey Golubev| Date: Wed, 07 Aug 2019 15:45:20 +0000
We explain how malware steals passwords and other valuable data stored in the browser — and how to protect yourself.
Read MoreCredit to Author: Igor Kuksov| Date: Mon, 05 Aug 2019 12:34:17 +0000
Smart home systems, drones, AI — we discuss the new trends and technologies in the field of home security.
Read More