Chip-based credit and debit cards are designed to make it infeasible for skimming devices or malware to clone your card when you pay for something by dipping the chip...
Read moreUsing the Attack Cycle to Up Your Security Game
July 30 2020Like the universe, the attack surface is always expanding. Here's how to keep up and even get ahead.
Read moreMore than 130 security researchers and developers are ready to showcase their work.
Read moreAverage Cost of a Data Breach: $3.86 Million
July 29 2020New IBM study shows that security system complexity and cloud migration can amplify breach costs.
Read moreA flaw in the GRUB2 bootloader affects most Linux devices and some Windows computers using UEFI Secure Boot.
Read moreSecurity Flaws Discovered in OKCupid Dating Service
July 29 2020Researchers identified a variety of vulnerabilities in apps and websites for the popular online dating platform.
Read moreHere’s Why Credit Card Fraud is Still a Thing
July 29 2020Most of the civilized world years ago shifted to requiring computer chips in payment cards that make it far more expensive and difficult for thieves to clone and use...
Read moreA vulnerability in the wpDiscuz plug-in could let attackers remotely execute code on the servers of affected websites.
Read moreDark Reading Video News Desk Returns to Black Hat
July 29 2020UPDATED: Coming to you prerecorded from in front of carefully arranged bookcases around the world ...!
Read moreEffective management of vulnerabilities can be done only when information about supply chain dependencies is accurate and recent.
Read more
Recent Comments