Moderate severity Lazy FP restore flaw affects Intel Core-based microprocessors. Intel has disclosed another speculative execution side-channel vulnerability affecting many of its modern microprocessors that gives attackers a way...
Read moreBrowse With Encryption
June 15 2018What Is Encryption? You may hear people use the term “encryption” and how you should use it to protect yourself and your information. However, encryption can be confusing and...
Read moreHow to strike ransomware out
June 15 2018Most businesses are ill prepared to handle a ransomware attack. In fact, according to a new study released by Carbonite, 68 percent of survey respondents believe their company is “very vulnerable”...
Read moreDemystifying Mental Health in the Infosec Community
June 15 2018Security experts talk about burnout, diversity, mental health, and legal issues in a new Community track at Black Hat USA. Security experts at different companies find common ground in...
Read morePitfalls of identity access management
June 14 2018Project-oriented thinking leads to shortchanging IAM. You avoid this by beginning with a multi-year plan that breaks up costs into implementation and operational stages. Forecast the number of people...
Read moreWorld Cup Cyberattack Likely, Experts Say
June 14 2018The majority of security professionals anticipate attacks on the 2018 FIFA World Cup’s network, social media. Nearly three quarters of security professionals think some type of cyberattack on the...
Read more6 things you need to know about IoT security
June 14 2018The FTC fined Visio for collecting and selling its smart TV owner data. As outlined in a recent IEEE IoT newsletter, good transparency principles aren’t exclusive to IoT, but...
Read moreResearchers dig into four types of cyberattacks targeting blockchain, how they work, and why early adopters are the easiest targets. If you haven’t jumped into the blockchain frenzy, chances...
Read moreYou Are a Target
June 14 2018A common misconception most people have about cyber attackers is that they use only highly advanced tools and techniques to hack into people’s computers or accounts. This is simply...
Read more
Recent Comments