Please turn on your JavaScript for this page to function normally.
chip
Researchers design a chip that checks for sabotage

With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install malicious …

antenna
Cybercriminals select insiders to attack telecom providers

Cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, according to Kaspersky Lab. In addition, these criminals are also …

face
Privileged user abuse and the insider threat

Although insider leaks and attacks continue to multiply, a Ponemon Institute study found that 58 percent of IT operations and security managers believe their organizations are …

Juniper Networks
Implant leaked by Shadow Brokers targets Juniper’s NetScreen firewalls

Juniper Networks has become the latest company to acknowledge that one of the implants leaked by the Shadow Brokers targets some of their products. Cisco and Fortinet did the …

Epic Games
Epic Games forums hacked again, over 800,000 users affected

Some of the online forums maintained by Epic Games, the video game development company behing the Unreal Engine technology and games based on it, have been hacked and their …

Android 7.0 Nougat
Android 7.0 Nougat is out, with new security features

Google has released Android 7.0 Nougat, and the newest version of the popular mobile OS is already being rolled out to Google’s existing Nexus devices. “Today, and …

linux tux
Linux kernel development: How fast it’s going and who is doing it

The Linux Foundation analyzed the work done by over 13,500 developers over more than a decade, to provide insight into the Linux kernel development trends and methodologies …

TeamViewer
Backdoor uses TeamViewer to spy on victims

A backdoor Trojan with spying capabilities that has been previously directed against European and Russian users is now being lobbed at US users, Dr. Web researchers have …

Qualys remediate
Key elements for successfully prioritizing vulnerability remediation

New vulnerabilities are disclosed every day, amounting to thousands per year. Naturally, not all vulnerabilities are created equal. In this podcast recorded at Black Hat USA …

World map
Global cyber security market: Competition forecast and opportunities

Increasing cyber attacks on the critical infrastructure has rendered worldwide security at risk. The prime motive behind these attacks is to gain access to financial …

data
Snowden documents definitely link Shadow Brokers’ leak to the NSA

Last week, Cisco and Fortinet confirmed that the exploits leaked by the Shadow Brokers and aimed at compromising their networking devices work as intended, but the origin of …

threat hunting
Open sourced: Cyber reasoning system that won third place in DARPA’s Cyber Grand Challenge

Earlier this month, the DARPA-backed Cyber Grand Challenge (CGC) has shown that a future in which computer systems will (wholly or partially) replace bug hunters and patchers …

Don't miss

Cybersecurity news