|Filed Under:||Technology / Security|
|Posts on Regator:||2323|
|Posts / Week:||6.7|
|Archived Since:||February 3, 2010|
The new division will focus on finding and fixing vulnerabilities -- before cyberattackers do.
Samsung's Galaxy Note 7 is a business productivity tool that'll need to carry a lot of weight for the company as well as its enterprise competition with Apple's iPhone.
PhishMe's Q2 malware review claims that ransomware is now firmly rooted in the attacker realm.
New research suggests encrypted traffic is becoming the go-to method for threat actors to hide malicious code.
The $9.4 million grant will be used to research new techniques for protecting embedded Internet of Things (IoT) devices.
Human traits like curiosity "cannot be patched" against these kinds of vulnerabilities, says one leading computer science researcher.
A group of hackers linked to China have allegedly compromised systems at major Vietnamese airports.
Is Russia at the heart of the alleged intrusion into Democratic Congressional Campaign Committee systems?
The software should help penetration testers identify and locate threats to Internet of Things (IoT) devices.
The consequences of circumventing censorship and masking your trail are now very severe.
Its third transparency report showed an eight-fold increase in search warrants.
The improvements offer 'zero practical benefit in exchange for shakier trust'.
A review of European privacy laws said that "the use of end-to-end encryption should also be encouraged."
The investigation into former core developer Jacob Appelbaum has brought forward claims that he "bullied" and "intimidated" others.
The company, which trains enterprise staff to detect malicious threats, has raised more cash to expand globally.
A number of companies have signed up for tech which makes real-time updates and DevOps easier to integrate.
The security flaw was one of "a bunch of critical problems" discovered by a prominent researcher who simply took a quick look at the software.
Many popular, low-cost wireless keyboards don't encrypt keystrokes.
The smart home tech company reportedly won't patch all of the vulnerabilities.
Tor nodes are acting oddly -- and it may be a sign that they are snooping on services they host.