Two years ago, Symantec and McAfee were both primed for a comeback. Today, both face big questions about their future. During the past two decades, the cybersecurity technology landscape...
Read moreTwo years ago, Symantec and McAfee were both primed for a comeback. Today, both face big questions about their future. During the past two decades, the cybersecurity technology landscape...
Read moreDangerous Domain Corp.com Goes Up for Sale
February 9 2020As an early domain name investor, Mike O’Connor had by 1994 snatched up several choice online destinations, including bar.com, cafes.com, grill.com, place.com, pub.com and television.com. Some he sold over the...
Read moreDangerous Domain Corp.com Goes Up for Sale
February 9 2020As an early domain name investor, Mike O’Connor had by 1994 snatched up several choice online destinations, including bar.com, cafes.com, grill.com, place.com, pub.com and television.com. Some he sold over the...
Read more5 Measures to Harden Election Technology
February 9 2020Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world’s most capable. Part 2 of a two-part series. The Iowa caucus isn’t the...
Read more5 Measures to Harden Election Technology
February 9 2020Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world’s most capable. Part 2 of a two-part series. The Iowa caucus isn’t the...
Read moreAlthough radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax. It’s almost impossible to think about modern...
Read moreAlthough radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax. It’s almost impossible to think about modern...
Read moreRobbinHood Kills Security Processes Before Dropping Ransomware
February 8 2020Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files. In a newly detected attack campaign, the attackers behind RobbinHood ransomware deploy...
Read more
Recent Comments