The advent of 5G presents an opportunity for us to think the exploding number of IoT devices and how we securely connect to the digital world.
Posted: October 22, 2018, 3:52 pm
A hack targeted the Direct Enrollment pathway, which allows insurance agents and brokers to help consumers sign up for Affordable Care Act coverage.
Posted: October 22, 2018, 3:41 pm
A critical streaming bug impacts Live Networks LIVE555 RTSPServer, but not the popular VLC and MPLayer client-side software.
Posted: October 22, 2018, 2:41 pm
Drupal's advisory also included three patches for "moderately critical" bugs.
Posted: October 20, 2018, 5:09 pm
The bugs let hackers crash IoT devices, leak their information, and completely take them over.
Posted: October 19, 2018, 3:24 pm
Simple technique enables attackers to leverage Windows OS component to maintain stealth and persistence post system compromise.
Posted: October 19, 2018, 2:22 pm
A custom malware used in a five-pronged APT espionage campaign was largely built from the defunct Comment Crew's proprietary code.
Posted: October 18, 2018, 7:17 pm
Tumblr stressed that there is no evidence the security bug was being abused or that unprotected account data was accessed.
Posted: October 18, 2018, 3:19 pm
The group is a successor to BlackEnergy and a subset of the TeleBots gang--and its activity is potentially a prelude to a much more destructive attack.
Posted: October 18, 2018, 3:08 pm
The update includes one critical flaw in Oracle GoldenGate with a CVSS 3.0 score of 10.0.
Posted: October 17, 2018, 6:49 pm
Serving the Technologist for more than a decade. IT news, reviews, and analysis.
Fee-based service couples the security of a private server with the reliability of the cloud.
Posted: October 17, 2018, 5:52 pm
Almost everyone has now migrated to TLS 1.2, and a few have moved to TLS 1.3.
Posted: October 16, 2018, 10:00 pm
Facebook's focus on misinformation is leaving an opening for another type of scam.
Posted: October 16, 2018, 12:42 am
"Our internal investigations directly contradict every consequential assertion."
Posted: October 8, 2018, 6:25 pm
Super Micro, Amazon, and Apple deny everything in the report.
Posted: October 4, 2018, 4:08 pm
Company plans stricter rules for developers and greater control for users.
Posted: October 2, 2018, 5:10 pm
Privacy-conscious users were unhappy at being signed in to browser without consent.
Posted: September 27, 2018, 9:26 pm
Phone-based authentication is the way forward instead.
Posted: September 24, 2018, 1:00 pm
The defenses put in place to thwart the 2008 attack turn out to be very weak.
Posted: September 13, 2018, 8:26 pm
In Curling v. Kemp, both sides are set to duke it out in court on Wednesday.
Posted: September 12, 2018, 8:30 am
And Microsoft is offering enterprises dedicated app compatibility support.
Posted: September 6, 2018, 3:55 pm
Their complexity makes them a security hazard; their ubiquity makes replacement nigh impossible.
Posted: September 5, 2018, 2:04 pm
Flaw allows a local user to obtain System privileges.
Posted: August 29, 2018, 4:18 pm
One Romanian campus computer lab both pentested the world and eventually helped protect it.
Posted: August 27, 2018, 1:00 pm
Flash will have to be enabled every time a site tries to use it.
Posted: August 21, 2018, 5:26 pm
Speculative execution attacks truly are the gift that keeps on giving.
Posted: August 14, 2018, 7:18 pm
Apps will be run in a virtual machine that's discarded after use.
Posted: August 9, 2018, 5:08 pm
Both companies insist nothing will change, but this former Cisco customer has doubts.
Posted: August 2, 2018, 10:08 pm
It's no longer necessary to run attacker code on the victim system.
Posted: July 26, 2018, 9:40 pm
An extra three years of patches are being offered to in-cloud users.
Posted: July 12, 2018, 10:06 pm