Intel issues updates to protect systems from Spectre and Meltdown
Intel has developed and is rapidly issuing updates for all types of Intel-based computer systems – including personal computers and servers – that render those …
Meltdown and Spectre: Data theft hardware bugs affect most modern CPUs
In the wake of yesterday’s news and speculation about a serious design flaw in Intel processors, the security researchers involved in discovering the issue and the …
36 fake security apps removed from Google Play
Google has recently pulled 36 fake security apps from Google Play, after they’ve been flagged by Trend Micro researchers. Posing as legitimate security solutions, and …
80% of smartphones will have on-device AI capabilities by 2022
Artificial intelligence (AI) features will become a critical product differentiator for smartphone vendors that will help them to acquire new customers while retaining current …
Q3 2017 Global DDoS Threat Landscape Report released
The newly released Q3 2017 Global DDoS Threat Landscape Report from Imperva Incapsula features insights on attacks and mitigation. These are some of the key findings: Bitcoin …
Ad targeters exploit browsers’ password managers to track users online
Ad targeters are exploiting browsers’ built-in login managers to covertly collect hashes of users’ email addresses, to be used to track them across the web. …
Upcoming patches for security flaw in Intel processors expected to slow down computers
Windows users whose PCs run on Intel processors can apparently expect their computers to slow down after next Tuesday. In fact, all computers using modern Intel chips – …
Despite cybersecurity concerns, many consumers don’t protect themselves
Despite awareness of the need for cybersecurity, many consumers are not taking proactive steps to keep their personal information protected from identity theft. With the …
How to keep your browser and devices safe from cryptojackers
Cryptojacking makes surfing the web similar to walking through a minefield: you never know when you might land on a booby-trapped site. Stealthy cryptocurrency mining scripts …
Make 2018 your year of taking password security more seriously
The popularity of passwords as a means of authentication is still not waning, so advice on how to opt for passwords that are hard to guess and crack is always timely. Choosing …
Security pros waste 10 hours a week due to inefficient systems
Process and software inefficiencies play a major role in slowing down an organization’s ability to detect and respond to cyber threats, according to LogRhythm. Over one-third …
Why ransomware? Let’s ask the bad guys
I am involved with ransomware because it is ‘fast, easy, and safe”. This was the feedback we got when we asked the bad guys about the motivations for being involved with this …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)