Researchers find 12 Android applications disguised as official COVID-19 contact tracing apps installing malware onto devices.
Read moreAsset Management Mess? How to Get Organized
June 10 2020Hardware and software deployments all over the place due to the pandemic scramble? Here are the essential steps to ensure you can find what you need -- and secure...
Read moreAn annual survey of penetration testers finds that although machines can quickly find many classes of vulnerabilities, human analysts are still necessary to gauge the severity of discovered issues.
Read moreWhile CISOs have been focused on immediate threats, it's time to look ahead to what a post-COVID-19 future will look like.
Read moreCan you tell whether you're talking to a human or AI?
Read moreA heatlh care app user found 50 "consultation replay" videos in his personal profile - but they weren't his.
Read moreBillions of devices affected by UPnP vulnerability
June 10 2020Stop us if you’ve heard this before but a researcher has uncovered a new security vulnerability affecting many devices running the Universal Plug and Play (UPnP) protocol.
Read moreAvailability Attacks against Neural Networks
June 10 2020New research on using specially crafted inputs to slow down machine-learning neural network systems: Sponge Examples: Energy-Latency Attacks on Neural Networks shows how to find adversarial examples that cause...
Read moreMicrosoft Patch Tuesday, June 2020 Edition
June 10 2020Microsoft today released software patches to plug at least 129 security holes in its Windows operating systems and supported software, by some accounts a record number of fixes in...
Read moreThe June release of security updates addresses several remote code execution vulnerabilities in SharePoint, Excel, Windows OLE, and other services.
Read more
Recent Comments