Please turn on your JavaScript for this page to function normally.
RSAC
Sessions and events to check out at RSA Conference 2019

RSA Conference 2019 takes place next week in San Francisco. Here’s a brief overview of what to check out while you’re at the conference. Read more about keynotes …

Webauthn
How WebAuthn aims to solve the password problem

One of the most pervasive challenges in cybersecurity is the balancing act between protection and usability. Security measures have to prevent malicious actors from accessing …

money
Social media-enabled cybercrime is generating $3.25 billion a year

Social media-enabled cybercrime is generating at least $3.25B in global revenue annually, according to an extensive six-month academic study undertaken by Dr. Mike McGuire, …

Door
Increasing security measures are driving cybercriminals to alter their techniques

Increased security measures and awareness are driving cybercriminals to alter their techniques in search of a better return on investment (ROI). Total recorded vulnerabilities …

DNA
Researchers eavesdrop on DNA synthesizer to steal genetic blueprint

Researchers from the University of California, Irvine (UCI) and the University of California, Riverside (UCR) have uncovered the possibility of an acoustic side-channel attack …

glasses
Consumer attitudes towards security breaches are changing significantly

Transatlantic businesses face greater short-term pain in the US but less long term retribution in the UK following a security breach, according to new data from payment …

fast
PDF viewers, online validation services vulnerable to digital signature spoofing attacks

Academics from Ruhr University Bochum have proven that the majority of popular PDF viewer apps and online digital signature validation services can be tricked into validating …

biohazard
Latest WinRAR, Drupal flaws under active exploitation

CVE-2018-20250, a WinRAR vulnerability that allows attackers to extract a malicious executable to one of the Windows Startup folder to be executed every time the system is …

patch
OSSPatcher: Automated mobile application patching for bugs in open source libraries

Researchers from the Georgia Tech and Peking University are working on OSSPatcher, a system for automatic patching of vulnerable open source libraries included in mobile …

Thunderbolt
Many computers are vulnerable to hacking through common plug-in devices

Attackers can compromise an unattended machine in a matter of seconds through devices such as chargers and docking stations. Vulnerabilities were found in computers with …

IoT
Most IoT devices are being compromised by exploiting rudimentary vulnerabilities

Cybercriminals are looking for ways to use trusted devices to gain control of Internet of Things (IoT) devices via password cracking and exploiting other vulnerabilities, such …

healthcare
Healthcare industry: Key trends and cybersecurity challenges

Each year, Bitglass analyzes data from the U.S. Department of Health and Human Services’ “Wall of Shame,” a database containing information about breaches of protected health …

Don't miss

Cybersecurity news