searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

hardware

Get our top stories in your inbox

Why enterprises need rugged devices with integrated endpoint management systems

February 25, 2021

The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal …

Server market revenue reached $22.6 billion in 3Q20

December 30, 2020

Vendor revenue in the worldwide server market grew 2.2% year over year to $22.6 billion during the third quarter of 2020 (3Q20), according to IDC. Worldwide server shipments …

5 reasons IT should consider client virtualization

December 18, 2020

Virtualization has brought a dramatic level of growth and advancement to technology and business over the years. It transforms physical infrastructure into dedicated, …

Engineers design transistor that disguises key computer chip hardware from hackers

December 11, 2020

A hacker can reproduce a circuit on a chip by discovering what key transistors are doing in a circuit – but not if the transistor “type” is undetectable. Purdue University …

D-Link routers vulnerable to remotely exploitable root command injection flaw

December 8, 2020

The Digital Defense Vulnerability Research Team uncovered a previously undisclosed vulnerability affecting D-Link VPN routers. D-Link DSR-150, DSR-250, DSR-500 and DSR-1000AC …

Researchers break Intel SGX by creating $30 device to control CPU voltage

November 16, 2020

Researchers at the University of Birmingham have managed to break Intel SGX, a set of security functions used by Intel processors, by creating a $30 device to control CPU …

Holiday gifts getting smarter, but creepier when it comes to privacy and security

November 12, 2020

A Hamilton Beach Smart Coffee Maker that could eavesdrop, an Amazon Halo fitness tracker that measures the tone of your voice, and a robot-building kit that puts your kid’s …

New side-channel attacks allow access to sensitive data on Intel CPUs

November 10, 2020

An international team of security researchers is presenting new side-channel attacks (CVE-2020-8694 and CVE-2020-8695), which use fluctuations in software power consumption to …

Global spending on cloud services to surpass $1 trillion in 2024

October 21, 2020

The COVID-19 pandemic has largely proven to be an accelerator of cloud adoption and extension and will continue to drive a faster conversion to cloud-centric IT. Global …

How to build up cybersecurity for medical devices

October 12, 2020

Manufacturing medical devices with cybersecurity firmly in mind is an endeavor that, according to Christopher Gates, an increasing number of manufacturers is trying to get …

Working together to secure our expanding connected health future

October 6, 2020

Securing medical devices is not a new challenge. Former Vice President Cheney, for example, had the wireless capabilities of a defibrillator disabled when implanted near his …

Public cloud IT infrastructure spending exceeds that for non-cloud IT infrastructure

October 5, 2020

Vendor revenue from sales of IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and private cloud, increased …

Posts navigation

1 2 3 4 5 … 80
tools

Protecting the digital workplace with an integrated security strategy

  • How do I select a cloud security solution for my business?
  • Closing the data divide: How to create harmony among data scientists and privacy advocates
Free certification Exam Action Plan from (ISC)²

What's new

industrial

Critical flaw in Rockwell PLCs allows attackers to fiddle with them (CVE-2021-22681)

analyst

Most IT security leaders lack confidence in their company’s security posture

world

Insights for navigating a drastically changing threat landscape

tools

Protecting the digital workplace with an integrated security strategy

Don't miss

industrial

Critical flaw in Rockwell PLCs allows attackers to fiddle with them (CVE-2021-22681)

tools

Protecting the digital workplace with an integrated security strategy

cloud

How do I select a cloud security solution for my business?

world

Insights for navigating a drastically changing threat landscape

search

Closing the data divide: How to create harmony among data scientists and privacy advocates

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • How do I select a cloud security solution for my business?
  • Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
  • How do I select a network monitoring solution for my business?
  • Tips for boosting the “Sec” part of DevSecOps

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise