Please turn on your JavaScript for this page to function normally.
biohazard
Researchers fight ransomware attacks by leveraging properties of flash-based storage

Ransomware continues to pose a serious threat to organizations of all sizes. In a new paper, “Project Almanac: A Time-Traveling Solid State Drive,” University of …

IoT
IoT cyberattacks are the new normal, the security mindset isn’t

Eight in ten organizations have experienced a cyberattack on their IoT devices in the past 12 months, according to new research by Irdeto. Of those organizations, 90% …

IoT
Enterprises: Analyze your IoT footprint to address security, privacy concerns

The Zscaler ThreatLabZ research team analyzed 56 million IoT device transactions to understand the types of devices in use, the protocols used, the locations of the servers …

Google Titan
Google offers free replacement for buggy Titan Security Keys

Misconfigured Bluetooth pairing protocols in Google’s Titan Security Keys may allow attackers to communicate with users’ security key or with the device their key …

USB
Employees are aware of USB drive security risks, but don’t follow best practices

Employees are aware of the risks associated with inadequate USB drive security – yet their employers aren’t mandating following best practices, according to a report by …

Cisco
High-risk vulnerability in Cisco’s secure boot process impacts millions of devices

Red Balloon Security has discovered a high-risk vulnerability in Cisco’s secure boot process which impacts a wide range of Cisco products in use among enterprise and …

AI
AI-optimized chipsets entering a new era as they become more specialized

The rapid adoption of artificial intelligence (AI) for practical business applications has introduced a number of uncertainties and risk factors across virtually every …

satellite
Securing satellites: The new space race

A decade ago, it would have cost you a billion dollars to deploy a satellite into space. Fast forward ten years and you can now have your own personal satellite floating in …

chip
Unhackable? New chip makes the computer an unsolvable puzzle

A new computer processor architecture that could usher in a future where computers proactively defend against threats, rendering the current electronic security model of bugs …

Dell laptop
Flaw in pre-installed software opens Dell computers to remote hijack

Dell computer owners should update the Dell SupportAssist software as soon as possible to close a high-risk remote code execution vulnerability. What is Dell SupportAssist? …

alert
Making the most of threat intelligence with threat intelligence gateways

Even though many security professionals are still dissatisfied with threat intelligence accuracy and quality, its use as a resource for network defense is growing. According …

medical
Hacking our way into cybersecurity for medical devices

Hospitals are filled with machines connected to the internet. With a combination of both wired and wireless connectivity, knowing and managing which devices are connected has …

Don't miss

Cybersecurity news