Vulnerability Prioritization: Are You Getting It Right?
August 10 2020Developers must find a way to zero in on the security vulns that present the most risk and quickly address them without slowing down the pace of development.
Read moreDevelopers must find a way to zero in on the security vulns that present the most risk and quickly address them without slowing down the pace of development.
Read moreYet another Internet-connected door lock is insecure: Sold by retailers including Amazon, Walmart, and Home Depot, U-Tec's $139.99 UltraLoq is marketed as a "secure and versatile smart deadbolt that...
Read moreThe latest articles and the latest Naked Security Live video - all in one place. Enjoy.
Read moreThree fundamental technologies -- chatbots, audio fakes, and deepfake videos -- have improved to the point that creating digital, real-time clones of people is merely a matter of integrating...
Read moreThere's a new SQUID: A new device that relies on flowing clouds of ultracold atoms promises potential tests of the intersection between the weirdness of the quantum world and...
Read moreThe attack has defaced the channels with images and content supporting Donald Trump.
Read moreResearcher will demonstrate at DEF CON an emerging threat to industrial control networks.
Read moreSecurity researchers found hundreds of pieces of vulnerable code in the Qualcomm Snapdragon chips powering Android phones.
Read moreBuilding successful macro attacks means getting past several layers of security, but a Black Hat speaker found a way through.
Read moreA series of business email compromise campaigns has been targeting executives of more than 1,000 companies, most recently in the US and Canada.
Read more
Recent Comments