Apple quickly rolled out the iOS 14.6, merely weeks after the release of iOS 14.5.1, as a response to the iPhone bugs and security issues that had hackers attacking users.
Take a Walk on the DarkSide: A Pipeline Cyber Crisis Simulation
Register today for Threatpost’s upcoming FREE live webinar, in partnership with Immersive Labs, on Wednesday, June 9 at 2 PM EDT, to see, first-hand, the impact of a major cyber breach in an emerging ransomware attack simulation.
GoToWebinar
Share:
The recent DarkSide cyberattack on Colonial Pipeline truly brought to light the risk ransomware can pose to a national industrial infrastructure. High-profile attacks like this have become increasingly common and can not only cost an organization dearly in corporate reputation, regulatory scrutiny, and financial loss, but can also impact the well-being of an entire nation.
Apple CEO Tim Cook delivers the keynote address during the 2019 Apple Worldwide Developer Conference (WWDC) at the San Jose Convention Center on June 03, 2019 in San Jose, California. New research found that most development teams, 81%, had knowingly pushed flawed code live.(Photo by Justin Sullivan/Getty Images)
Overwhelmed and resource-starved app developers are approving vulnerable code and pushing it into live applications in alarming numbers, according to a new research report.
Equally troubling: 44% of polled security teams said they doubted their application build environment is secure enough to repel a dedicated attackerâs attempt at a compromise, such as the one that SolarWinds experienced last year.
A new study shows that 81 percent of development teams have knowingly pushed vulnerable code live, with 20 percent of senior managers even admitting to doing so often.
Microsoft today released fixes to plug at least 55 security holes in its Windows operating systems and other software. Four of these weaknesses can be exploited by malware and malcontents to seize complete, remote control over vulnerable systems without any help from users. On deck this month are patches to quash a wormable flaw, a creepy wireless bug, and yet another reason to call for the death of Microsoft's Internet Explorer (IE) web browser.