Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
Read moreResearchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.
Read moreSecurity leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
Read moreWhy Supply Chain Attacks Are Destined to Escalate
August 5 2021In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part...
Read moreRansomware Gangs and the Name Game Distraction
August 5 2021It's nice when ransomware gangs have their bitcoin stolen, malware servers shut down, or are otherwise forced to disband. We hang on to these occasional victories because history tells...
Read moreZoom Lied about End-to-End Encryption
August 5 2021
The facts aren’t news, but Zoom will pay $85M — to the class-action attorneys, and to users — for lying to users about end-to-end encryption, and for giving...
Read moreCalling someone back feels safer than clicking an unknown link... but it isn't! Remind your friends and family.
Read moreCalling someone back feels safer than clicking an unknown link... but it isn't! Remind your friends and family.
Read moreParagon: Yet Another Cyberweapons Arms Manufacturer
August 3 2021
Forbes has the story:
Paragon’s product will also likely get spyware critics and surveillance experts alike rubbernecking: It claims to give police the power to remotely break into encrypted...
Read more
New Normal Demands New Security Leadership Structure
August 2 2021At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.
Read more
Recent Comments