The NSA warns enterprises to beware of third-party DNS resolvers
Getty Images DNS over HTTPS is a new protocol that protects domain-lookup traffic from eavesdropping and manipulation by malicious parties.…
Hackers used 4 zero-days to infect Windows and Android devices
Google researchers have detailed a sophisticated hacking operation that exploited vulnerabilities in Chrome and Windows to install malware on Android…
Hackers steal Mimecast certificate used to encrypt customers’ M365 traffic
Email management provider Mimecast said that hackers have compromised a digital certificate it issued and used it to target select…
Parler’s amateur coding could come back to haunt Capitol Hill rioters
Getty Images By now, you may have heard of the hacker who says she scraped 99 percent of posts from…
Telegram feature exposes your precise address to hackers
If you’re using an Android device—or in some cases an iPhone—the Telegram messenger app makes it easy for hackers to…
New York City proposes regulating algorithms used in hiring
In 1964, the Civil Rights Act barred the humans who made hiring decisions from discriminating on the basis of sex…