SaaS security in 2021
The migration toward subscription-based services via the SaaS business model isn’t new this year — it’s part of a larger shift away from on-premises datacenters, applications, …
Engineers design transistor that disguises key computer chip hardware from hackers
A hacker can reproduce a circuit on a chip by discovering what key transistors are doing in a circuit – but not if the transistor “type” is undetectable. Purdue University …
Review: The Perfect Weapon
John Maggio, an award-winning producer, director, and writer, known for The Newspaperman: The Life and Times of Ben Bradlee (2017), Panic (2018), The Italian Americans (2015) …
Number of corporate credentials exposed on the dark web increased by 429%
While there has been a year-over-year decrease in publicly disclosed data breaches, an Arctic Wolf report reveals that the number of corporate credentials with plaintext …
Securing mobile devices, apps, and users should be every CIO’s top priority
More than 80% of global employees do not want to return to the office full-time, despite 30% employees claiming that being isolated from their team was the biggest hindrance …
New AI algorithm to detect cryptocurrency miners as they steal power
Computer scientists have developed a new artificial intelligence (AI) system that may be able to identify malicious codes that hijack supercomputers to mine for cryptocurrency …
State Department offers $10 million for info on hackers targeting U.S. elections
As the day of the U.S. presidential elections is quickly approaching, election security is again becoming a topic of more and more security discussions. Are the polling booth …
Study of global hackers and the economics of security research
Human ingenuity supported by actionable intelligence were found to be critical ingredients to maintaining a resilient infrastructure, Bugcrowd reveals. In fact, 78% of hackers …
Fixing all vulnerabilities is unrealistic, you need to zero in on what matters
As technology constantly advances, software development teams are bombarded with security alerts at an increasing rate. This has made it nearly impossible to remediate every …
Computer science student discovers privacy flaws in security and doorbell cameras
Ring, Nest, SimpliSafe and eight other manufacturers of internet-connected doorbell and security cameras have been alerted to systemic design flaws discovered by Florida Tech …
COVID-19 has contributed to record breaking cybercriminal activity
There has been an exponential growth in phishing and website scams in Q1 2020, according to a Bolster analysis of over 1 billion websites. 854,441 confirmed phishing and …
Advanced attack scenarios and sabotage of smart manufacturing environments
Advanced hackers could leverage unconventional, new attack vectors to sabotage smart manufacturing environments, according to Trend Micro. Industry 4.0 Lab, the system that …
Featured news
Sponsored
Don't miss
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)
- Debunking compliance myths in the digital era
- How CISOs tackle business payment fraud
- AI framework vulnerability is being used to compromise enterprise servers (CVE-2023-48022)
- Attackers leverage weaponized iMessages, new phishing-as-a-service platform