The decoys and lures will help redirect attacks away from devices that can’t be protected through traditional means. The US Department of Energy’s Office of Technology Transitions (OTT) Technology...
Read moreThe decoys and lures will help redirect attacks away from devices that can’t be protected through traditional means. The US Department of Energy’s Office of Technology Transitions (OTT) Technology...
Read moreHow Can We Make Election Technology Secure?
February 10 2020In Iowa this week, a smartphone app for reporting presidential caucus results debuted. It did not go well. November 5, 2019: In Northampton County, Pennsylvania, a candidate for judge,...
Read moreHow Can We Make Election Technology Secure?
February 10 2020In Iowa this week, a smartphone app for reporting presidential caucus results debuted. It did not go well. November 5, 2019: In Northampton County, Pennsylvania, a candidate for judge,...
Read moreInvisible Pixel Patterns Can Communicate Data Covertly
February 10 2020University researchers show that changing the brightness of monitor pixels can communicate data from air-gapped systems in a way not visible to human eyes. Computers disconnected from the Internet...
Read moreInvisible Pixel Patterns Can Communicate Data Covertly
February 10 2020University researchers show that changing the brightness of monitor pixels can communicate data from air-gapped systems in a way not visible to human eyes. Computers disconnected from the Internet...
Read morePoll: A Matter of Trust
February 10 2020Has working in the cybersecurity industry affected your ability to trust? Take the poll now. The Edge is Dark Reading’s home for features, threat data and in-depth perspectives on...
Read morePoll: A Matter of Trust
February 10 2020Has working in the cybersecurity industry affected your ability to trust? Take the poll now. The Edge is Dark Reading’s home for features, threat data and in-depth perspectives on...
Read moreFacebook Tops Imitated Brands as Attackers Target Tech
February 9 2020Brand impersonators favor Facebook, Yahoo, Network, and PayPal in phishing attempts to steal credentials from victims. Facebook is the most popular company to impersonate among cybercriminals launching brand phishing...
Read more
Recent Comments