Turns out, creating wireless ecosystems for a vast number of different architectures, configurations, and use cases is hard.
Read moreCritical Instagram Flaw Could Let Attackers Spy on Victims
September 24 2020A now-patched remote code execution vulnerability could be exploited with a specially sized image file, researchers report.
Read moreSolving the Problem With Security Standards
September 24 2020More explicit threat models can make security better and open the door to real and needed innovation.
Read moreCrowdStrike Agrees to Acquire Preempt Security for $96M
September 24 2020CrowdStrike plans to use Preempt Security's conditional access technology to strengthen its Falcon platform.
Read moreCrowdStrike Agrees to Acquire Preemptive Security for $96M
September 24 2020CrowdStrike plans to use Preemptive Security's conditional access technology to strengthen its Falcon platform.
Read moreMicrosoft Warns of Attackers Now Exploiting ‘Zerologon’ Flaw
September 24 2020The Security Intelligence team at Microsoft is tracking newly waged exploits in the wild.
Read moreFuzzing Image Parsing in Windows, Part One: Color Profiles
September 24 2020Image parsing and rendering are basic features of any modern operating system (OS). Image parsing is an easily accessible attack surface, and a vulnerability that may lead to...
Read moreFuzzing Image Parsing in Windows, Part One: Color Profiles
September 24 2020Image parsing and rendering are basic features of any modern operating system (OS). Image parsing is an easily accessible attack surface, and a vulnerability that may lead to...
Read moreFuzzing Image Parsing in Windows, Part One: Color Profiles
September 24 2020Image parsing and rendering are basic features of any modern operating system (OS). Image parsing is an easily accessible attack surface, and a vulnerability that may lead to...
Read more
Recent Comments