Please turn on your JavaScript for this page to function normally.
World
Trends that will shape the 2020 technology market

In 2020, there will be greater adoption of Continuous Intelligence (CI) technologies, which will elevate IoT data analytics way beyond traditional operational levels and have …

Bluetooth
Critical Bluetooth flaw opens millions of devices to eavesdropping attacks

A newly disclosed vulnerability (CVE-2019-9506) in the Bluetooth Core Specification can be exploited by attackers to intercept and manipulate Bluetooth communications/traffic …

Qualcomm demonstrates first 5G laptop with integrated modem

Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced …

Qualcomm
Qualcomm chips leak crypto data from secure execution environment

A vulnerability in Qualcomm chips could be exploited by attackers to retrieve encryption keys and sensitive information from the chipsets’ secure execution environment, …

building
IoT security: The work on raising the bar continues

One of the main goals of Chief Information Security Officers should be to help the organization succeed, and they are unlikely to do that by denying their organization the …

Bluetooth
Bluetooth vulnerability allows snooping of traffic between paired devices

Researchers Eli Biham and Lior Neumann have discovered a vulnerability in two Bluetooth features that could be exploited by attackers to gain a man-in-the-middle position and …

Don't miss

Cybersecurity news