Security News & Reviews
More Security News
VIDEO: Nadir Izrael, co-founder and CTO of Armis Security discusses the expanding impact of the BlueBorne bluetooth security vulnerability that his firm discovered.
The need for continued evolution of cyber-security technologies and approaches was a key theme at the 11th edition of the SecTor security conference in Toronto.
New PeopleSoft JoltandBleed vulnerabilities could enable an attacker to leak information and gain control of an unpatched system.
Newcomer has built a new SaaS platform from scratch to enable organizations of all sizes to protect data either stored or aggregated on multiple clouds and on premises.
Attackers are using Microsoft’s Dynamic Data Exchange protocol to download and install malware. Microsoft has warned about the issue, and given users guidance on how to protect themselves, but does not consider it a vulnerability.
The free service backed by IBM, Packet Clearing House and the Global Cyber Alliance aims to make 184.108.40.206 the DNS resolver of choice for internet security.
NEWS ANALYSIS: Security researchers say that North Korea’s activities have changed recently in a way that may indicate that the rogue regime may be gathering the information it needs launch a global cyber-attack.
In the face of overwhelming evidence that the Russians meddled in the 2016 U.S. presidential election, states are adopting auditing measure to detect any possible direct ballot fraud and give voters confidence in the results.
In a keynote address at the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software and the internet of things.
A Lookout security report warns organizations to not forget about mobile when considering EU GDPR compliance requirements.
In a session at the SecTor security conference, a security researcher reveals details on the tools and methods used by multiple attack groups operating out of North Korea.
At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data privacy for cyber-security.
A security researcher explains how WPA2 Enterprise wireless security can be bypassed and why the EAP-TLS wireless authentication protocol should be more widely deployed to help mitigate risks.